• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.702 ■ Fall 2020 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

WK #5: Reading Discussions

September 24, 2020 by Mei X Wang 1 Comment

Netcat= The TCP/IP Swiss Army Knife

  • Netcat is used to write and read data across TCP/UDP network connections. It can be used to debug and explore target networks. It can create just about any network connections.
  • Netcat can be used to scan ports, test firewalls, proxy gateways, script backends, and more.
  • Using NetCat to remote command prompt: “nc -1 -p1234 -d -e cmd.exe -L”
    • Using Netcat to listen to port 1234, while running detached from the console, and execute command prompt when the connection is made.

 

  1. NetCat is an extremely useful tool because it not only can scan for open ports, but it can also utilize these open ports to take over the target machine. What precautions can be made to avoid being exploited?
  2. What are some ways hackers are able to hide NetCat on the target system?

Filed Under: Uncategorized Tagged With:

Reader Interactions

Comments

  1. Anthony Messina says

    September 27, 2020 at 11:36 pm

    Generally a hacker will hide the netcat listener deep in the files of a webpage where many untrained users fail to look. If the website was breached, netcat could also be placed somewhere in the appdata folder of the user account that was connected to the webpage such as the IUSR account in windows. Generally they will change the name of the file as well to further obfuscate it from detection.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (46)
  • Week 01: Overview (3)
  • Week 02: TCP/IP and Network Architecture (6)
  • Week 03: Reconnaisance (5)
  • Week 04: Network Mapping and Vulnerability Scanning (11)
  • Week 05: Metasploit (10)
  • Week 06: More Metasploit (4)
  • Week 07: Social Engineering (7)
  • Week 08: Malware (6)
  • Week 09: Web Application Hacking (7)
  • Week 10: SecuritySheperd (6)
  • Week 11: Intro to Dark Web and Intro to Cloud (4)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (7)
  • Week 13: WPA2 Enterprise and Beyond WiFi (3)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (4)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in