• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.702 ■ Fall 2020 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

Week 5 – Readings: Netcat

September 27, 2020 by Anthony Messina Leave a Comment

Netcat is a featured networking utility which reads and writes data across network connections, using the TCP/IP protocol.  It is designed to be a back-end tool that can be used directly or easily driven by other programs and scripts.  At the same time, it is packed with other features such as port scanning or copying files over the network without having a FTP or HTTP server.  Netcat is often used by hackers to achieve a shell on a victim’s computer.  If a hacker was able to breach a website, they could upload a shell script to the site.  The script would be modified to connect to the attackers IP, on a given port, say 9999.  Once the shell is uploaded, the attacker would setup a netcat listener on their machine with the commands:

nc –nvlp 9999

This essentially tells netcat (nc) not resolve names (-n), to be verbose printing out when a connection occurs (-v), to listen (-l) on a given local port (-p)

Once the listener is set, the attacker would navigate to the page were they uploaded the shell script, and it would execute and then there would be a shell prompt in the terminal where the netcat listener was set.

Questions for the class:

What else can netcat be used for?

Filed Under: Week 05: Metasploit Tagged With:

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (46)
  • Week 01: Overview (3)
  • Week 02: TCP/IP and Network Architecture (6)
  • Week 03: Reconnaisance (5)
  • Week 04: Network Mapping and Vulnerability Scanning (11)
  • Week 05: Metasploit (10)
  • Week 06: More Metasploit (4)
  • Week 07: Social Engineering (7)
  • Week 08: Malware (6)
  • Week 09: Web Application Hacking (7)
  • Week 10: SecuritySheperd (6)
  • Week 11: Intro to Dark Web and Intro to Cloud (4)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (7)
  • Week 13: WPA2 Enterprise and Beyond WiFi (3)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (4)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in