Difference between revisions of "Netcat"

From wikieduonline
Jump to navigation Jump to search
Tags: Mobile web edit, Mobile edit
Tags: Mobile web edit, Mobile edit
Line 11: Line 11:
 
* <code>echo "text to send" | nc 10.10.10.10  54</code>
 
* <code>echo "text to send" | nc 10.10.10.10  54</code>
  
* Forward port:
+
* Forward port (see also <code>[[socat]]</code>):
 
:<code>nc -l -p ORIGIN_PORT -c 'nc DESTINATION_IP DESTINATIO_PORT'</code>
 
:<code>nc -l -p ORIGIN_PORT -c 'nc DESTINATION_IP DESTINATIO_PORT'</code>
 
:<code>nc -l -p 2222 -c 'nc 10.10.10.4 8888'</code>
 
:<code>nc -l -p 2222 -c 'nc 10.10.10.4 8888'</code>

Revision as of 04:13, 13 May 2020

Netcat is the swiss army knife of the hackers. Netcat is used for file (exploit) transfer, finding open ports & remote administration (Bind & Reverse Shells). You can manually connect to any network service like HTTP using netcat. Another utility is to listen on any UDP/TCP ports on your machine for any incoming connections.

  • Windows: ncat.exe
  • Linux:


nc examples

  • echo "text to send" | nc IP port
  • echo "text to send" | nc 10.10.10.10 54
  • Forward port (see also socat):
nc -l -p ORIGIN_PORT -c 'nc DESTINATION_IP DESTINATIO_PORT'
nc -l -p 2222 -c 'nc 10.10.10.4 8888'
<nc<IPaddress or FQDN> <port number>

Related commands

See also

Advertising: