0% found this document useful (0 votes)
13 views18 pages

Lab 8

The document discusses how to use the Netcat tool to perform various tasks like port scanning, file transfer, and creating backdoors. It explains how to use Netcat for port scanning by scanning a target IP address and port range. It also describes how to use Netcat for chatting between two devices by establishing a connection and communicating over it. Further, it shows how to transfer a file between systems using Netcat by running it in listening and sending modes.

Uploaded by

m7md2512
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views18 pages

Lab 8

The document discusses how to use the Netcat tool to perform various tasks like port scanning, file transfer, and creating backdoors. It explains how to use Netcat for port scanning by scanning a target IP address and port range. It also describes how to use Netcat for chatting between two devices by establishing a connection and communicating over it. Further, it shows how to transfer a file between systems using Netcat by running it in listening and sending modes.

Uploaded by

m7md2512
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

Mobile Hacking

NetCat – The "Swiss Army Knife"


By: Mohamed Ibrahim
2

DISCUSSION

▸ Netcat or NC is a utility that is able to write and read data


across TCP and UDP network connections. If you are
responsible for network or system security, it essential that
you understand the capabilities of Netcat.

▸ Netcat can be used as port scanner, a backdoor, a port


redirector, a port listener and lots of other cool things too.
3

Getting Started with Netcat

▸ To start NC, the most basic option we can use the help
command. This will show us all the options that we can use
with Netcat. The help command is the following one: nc -h
4

1. Scan Ports
5

Scan Ports

▸ Netcat can scan ports at the target, and will likely inform you about an FTP
server, telnet server, and mailer along the way.

▸ nc -v –w2 –z ip-address port range


6

2. Chatting
7

Chatting

▸ Netcat can also be used to chat between two users. We need


to establish a connection before chatting. To do this we are
going to need two devices. One will play the role of initiator
and one will be a listener to start the conversation and so
once the connection is established, communication can be
done from both ends.
8

Chatting

▸ First device:

▸ nc –lvp port_number

▸ Second device:

▸ nc ip-address of first device port_number


9

Chatting
10

3. File Transfer
11

File Transfer

▸ Netcat can be used to transfer the file across devices. Here


we will create a scenario where we will transfer a file from a
windows system to Kali Linux system.

▸ Windows:

▸ nc –lvp port_number <filename.txt

▸ Kali:

▸ nc ip-address port_number >copy.txt


12

File Transfer
13

4. Creating a backdoor
14

Creating a backdoor

▸ We can also create a backdoor using NC. To create a


backdoor on the target system that we can come back to at
any time. Command for attacking a Linux System.

▸ windows:

▸ nc -lvp port_number -e program

▸ Kali:

▸ nc ip_address port_number
15

Creating a backdoor
16

NetCat on mobile
17

NetCat on mobile
18

THANKS!

You might also like