Netcat= The TCP/IP Swiss Army Knife
- Netcat is used to write and read data across TCP/UDP network connections. It can be used to debug and explore target networks. It can create just about any network connections.
- Netcat can be used to scan ports, test firewalls, proxy gateways, script backends, and more.
- Using NetCat to remote command prompt: “nc -1 -p1234 -d -e cmd.exe -L”
- Using Netcat to listen to port 1234, while running detached from the console, and execute command prompt when the connection is made.
- NetCat is an extremely useful tool because it not only can scan for open ports, but it can also utilize these open ports to take over the target machine. What precautions can be made to avoid being exploited?
- What are some ways hackers are able to hide NetCat on the target system?
Anthony Messina says
Generally a hacker will hide the netcat listener deep in the files of a webpage where many untrained users fail to look. If the website was breached, netcat could also be placed somewhere in the appdata folder of the user account that was connected to the webpage such as the IUSR account in windows. Generally they will change the name of the file as well to further obfuscate it from detection.