{"id":6720,"date":"2020-09-24T22:20:39","date_gmt":"2020-09-25T02:20:39","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/?p=6720"},"modified":"2020-09-24T22:20:39","modified_gmt":"2020-09-25T02:20:39","slug":"wk-5-reading-discussions","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/2020\/09\/24\/wk-5-reading-discussions\/","title":{"rendered":"WK #5: Reading Discussions"},"content":{"rendered":"<p><strong>Netcat= The TCP\/IP Swiss Army Knife<\/strong><\/p>\n<ul>\n<li>Netcat is used to write and read data across TCP\/UDP network connections. It can be used to debug and explore target networks. It can create just about any network connections.<\/li>\n<li>Netcat can be used to scan ports, test firewalls, proxy gateways, script backends, and more.<\/li>\n<li>Using NetCat to remote command prompt: &#8220;nc -1 -p1234 -d -e cmd.exe -L&#8221;\n<ul>\n<li>Using Netcat to listen to port 1234, while running detached from the console, and execute command prompt when the connection is made.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ol>\n<li>NetCat is an extremely useful tool because it not only can scan for open ports, but it can also utilize these open ports to take over the target machine. What precautions can be made to avoid being exploited?<\/li>\n<li>What are some ways hackers are able to hide NetCat on the target system?<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Netcat= The TCP\/IP Swiss Army Knife Netcat is used to write and read data across TCP\/UDP network connections. It can be used to debug and explore target networks. It can create just about any network connections. Netcat can be used to scan ports, test firewalls, proxy gateways, script backends, and more. Using NetCat to remote [&hellip;]<\/p>\n","protected":false},"author":14985,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-6720","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-uncategorized","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/posts\/6720","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/users\/14985"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/comments?post=6720"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/posts\/6720\/revisions"}],"predecessor-version":[{"id":6721,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/posts\/6720\/revisions\/6721"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/media?parent=6720"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/categories?post=6720"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/tags?post=6720"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}