Ethical Experts
Ethical Experts

A Community Dedicated to Helping and Learning . Here You Will Get Hacking Tutorials and Monetizing Methods . We Hope You Have a Pleasant Stay
 
HomeHome  SearchSearch  FAQFAQ  RegisterRegister  Log in  
Still Currently working on the forum design, until I find a perfect design that can sit there for the whole life :p .. Please Bare with us if you see the design change while / after you refresh a page or return ! Sorry for the Inconvenience ~!
Search
 
 

Display results as :
 
Rechercher Advanced Search
Latest topics
» Hack Pack : Largest Hacking Tools Collection
Tue Apr 28, 2015 9:35 am by THE-OUTSIDER

» Hi everyone!
Fri Nov 07, 2014 11:24 pm by zekrum

» Hacking Email ID's
Thu Sep 25, 2014 7:22 pm by NAVEEN KUMAR . S

» entering in a computer binary
Sat Sep 20, 2014 1:29 pm by erosh23

» hi hackers
Sat Sep 20, 2014 1:26 pm by erosh23

» Introduce Yourself !
Sat Sep 20, 2014 1:23 pm by erosh23

» Hello guys
Wed Jul 30, 2014 10:52 pm by RZero67

» need botnet like zues Betabot or any good botnet files please admin help me
Fri Jul 25, 2014 9:44 pm by sire_roktiv

» Extension Spoofer v0.1 [Beta Release]
Fri Jul 11, 2014 9:33 am by The Joker

Most Viewed Topics
Hack Pack : Largest Hacking Tools Collection
HACK WIFI PASSWORD USING CMD WHEN YOU ARE CONNECTED WITH WIFI
Hack Your BroadBand !! RISK FREE !!
How to Hack the Windows Admin Password Using OphCrack in Backtrack tutorial
Hacking With Keyloggers Prorat
How to Get Unlimited time in an Internet Cafe ... :D
Cracking a WPA/WPA-2 Password.. ;)
How to Hack Websites & Servers - Tutorial
Backtrack and Facebook
Credit Card Generating Sequence
Keywords
netcat
Facebook Like
Similar topics

Share | 
 

 Netcat Tutorial : Part 1

View previous topic View next topic Go down 
AuthorMessage
The Joker
Admin
Admin
avatar

Posts : 182
Join date : 2012-06-11
Age : 26

PostSubject: Netcat Tutorial : Part 1    Wed Sep 26, 2012 6:49 am

Netcat is utility used to write data across TCP and UDP networks. Using netcat an attacker can place backdoor that will allow him/her to telnet DOS shell. In fact netcat can be used as port scanner, banner grabbing tool, Trojan and backdoor. The power of netcat can be calculated from the fact that it can act as both server and client and even doesn't get detected by Anti-Virus and even if it gets detected its source code is available add some unnecessary code that will change its signature thus allowing it by bypass Anti-Virus. This tutorial is aimed at complete beginner to netcat.


First of all you'll need two machines to practice netcat, machines connected in LAN will also do, First Set Up Your Hacker LAB ! o practice netcat, lets call them as machine A and machine B,
In my case,

Machine A: 192.168.248.128
Machine B: 192.168.248.130

Download Netcat to C directory in machine B and type following command,

C:\>nc -h

this command will show you help file for netcat

C:\>nc -v -w2 -z 192.168.248.128 120-140



Above command will scan all ports from 120 to 140 of machine A . Now lets analyze command.

v - tells to keep output in verbose mode
w2 - tells to wait for 2 seconds after connection closes
z - this option tells netcat to scan ports for machine A

Now there is possibility that scanning each port in linearity may cause trigger in alarm in such case you can add interval between each port scan using ' i ' . Suppose you need to put 2 second delay between each port scan, you will have to type above command as follows.

C:\>nc -v -w2 -i2 -z 192.168.248.128 120-140

Now one big thing though netcat provides port scanning its better not to use it unless you don't have any other option than it, better tools like nmap, hping and superscan 4 are already available for port scanning and they know what their job is

Next is we can use netcat as banner grabbing tool that means it can grab application version, I ll advise you to run this command against a PC running server.

C:\>nc -v -n 192.168.248.128 80

v - tells keep output in verbose mode
n - do not resolve DNS, keep all addresses numerical

You can grab banner of each service running behind listed ports. For now lets limit tutorial here, in next section we will see how to use netcat as backdoor and file transfer wizard.

___________________________________________________
Do NOT PM me until you are DONATING or Your Upgrade  hasn't been completed even after you have purchased it .
If is one of the above, you can either choose to PM or mail me ..
Back to top Go down
View user profile http://teamiha.tumblr.com
 
Netcat Tutorial : Part 1
View previous topic View next topic Back to top 
Page 1 of 1
 Similar topics
-
» I know the volcano story is becoming part of history.
» What's your favorite part of the newspaper?
» Selenium Webdriver Tutorial with Practice Exercises
» GIMP Hair Tutorial
» [Tutorial] Specialized Favorites

Permissions in this forum:You cannot reply to topics in this forum
Ethical Experts :: Hacking Section :: Hacking Tutorials-
Jump to: