![]() ![]() Netcat allows us to do banner grabbing to get relevant information about a specific port or a specific page which service is running, the version, etc. On the client machine from the terminal with the command nc we indicate the ip address of the server machine and the port that is listening, which in my case is 5000.Īnd we can see that I can see the messages that the server machine is sending me on the client machine. If the client machine is connected to our server it will report us by console and we can send messages. On the attacker’s machine I am going to listen on port 5000 with the parameter -l (listen). Netcat allows us to communicate with client machines via tcp, as if it were a kind of chat to communicate. ![]() We can specify that only ports that are open or successful will be reported by the console with the command grep. With the -u parameter we specify that we want to scan udp ports. The parameter -v it’s for verbose, that we tell it to report back to us everything that is happening on the console. The parameter -n we indicate only ip adress, no dns names. With the parameter -z we indicate that we only search for open ports, without sending any data. it doesn’t do a full scan like nmap, but it reports back to the console if the port we specified is open or not. we can specify port ranges to report if any of those port ranges are open. ![]() With the -help parameter we can see the possibilities that netcat offers us and if we want to know more information about each parameter is to use the command man to see the netcat documentation. In some Windows versions it is not installed by default, so we have to install the file called nc.exe. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |