Netcat

  • November 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Netcat as PDF for free.

More details

  • Words: 2,722
  • Pages: 27
Satanic Soulful 29/1/1384 Contact: [email protected] [email protected] Special TNX 2: Hell Hacker – B0rn2h4k – S hahro Z – XshabgardX Im4n & Y4hoO Emperor

!" # $ % % & '( () *+, (. / .0 (1 2&3 $ 1 1 .% 4 5(1 & ' 6 % )/ ( * 7 ( *;7 $% : / $ (,8 9 < 5 1 (,8 9 & / % % )/ (1 , = * ? 7$ *9 @<7$

2 .> 1 (,8 9 +, & % )/ C / A #1 B 1

A1 Hacker’s Culb - Black Hat Hacker -@tstake -Hobbit

7 7? 42 (1 (8 $% D /% * *? 7 E1 &$ 7 ?&F ? % % C% D % F G 4 .? 1 2 . 7 (1$ * 7 E1 9 & 7 7 /$ H ? % % C % % CCC $ .(<7? IJ+8 , '(1 (. 1 ( (. / ? &$' J+ G < I$ H J . EK2 9 2 9 & (. K ? 7 ( L MN ! (1 = 1 % % )/ EK 1 >)? 1 EK2 H O N (1 % I 7H * ! I$ . F ? % &% 1 7 4 EK2 9 9 < C 1 1 I ? 7 E1 ? 7 % 9 1 % (D<7 EK2 9 C% % QRRRP/ % insecure.Org? /& / 1 H S E*TU % 4(1 2$% % ? 7 E1 9 1 9 V W (1 C%%X M 4 <7 YR9 1 P $ K* 2/ % % QRRZP/ % C / (K* I 1 E1 O [ \ 5 / J [ (. / ? 7 E1 & C% % % $

&

7 % % / % I(. / ? EK2 ( (1 * C 1 4Udp$ Tcp !3M T U& ( ?$ $! :D 5(1 BackDoor,Port Redirector,Port Listener, Banner C .\<5CC$Grabber % % E9 , $ 1 < 7 .9 ? 1 E1 9 1 ( , C 1 % 31 ? 7 1 I(<7(. UBack-End? 1 9 < ? E1 ! G (1 :% ? 7( 1 ]/ *% /(1$ <8 ( U(1 / C% * I% )/ % $% ^ /$ (- % % * *? 7% 1 .(. / , 1 E1 (* 7 (.? U (1 ' %&P $ ( / C .% F 1 .W% PM U_ \ 5 /? 1 $ Hobbit . ]/ C D Y``aP/ % $ % 1 &$ $ % 4? 1 EK2 9 K 3 / #. b ,(1 P$? C % *(c 5 &1 (1 $ U7

(1

:1

? *d$ A

U (1 7 4(1 * . % 9

UDP $ TCP?$

1 PM P IE $ PM ? I 1 DNS(,/ e V $ P/ \ . / 1 ! 7& % )/ ( e %' 7& % )/ . , 1 <7 . ! G (1 ! f 1I K %M % 5 K]4? 7 4 1I ( gN % ]4H ! G (1 .P/ , (1 7% _ $ /? 1 7( 1 /(1 & ?%$ $ H K

NetCat 1 / K. / /' 1 G .\ ^ . % 4 /h i iMakeFile \ K(1 7: C . % G Make <systype> /%$ % % L ND C% D 7j ? \ K$ ( E*

C

1

%

/ ( E* /h C .O N

< I% * Generic

1 < +M (1 ?& &$ $ % \1 I Nc.exe ? \ K& % )/ 1 , $ .% -%

&e %'&

Http://atstake.com/research/tools/network_utilities

nc nc ? 7

, % $' /% (1 ? 1

nc -help

O

$

[v1.10 NT] connect to somewhere: nc [-options] hostname port[s] [ports] ... listen for inbound:

nc -l -p port [options] [hostname]

[port] options: -d

detach from console, stealth mode

-e prog

inbound program to exec [dangerous!!]

-g gateway -G num -h -i secs -l

source-routing hop point[s], up to 8 source-routing pointer: 4, 8, 12, ...

this cruft delay interval for lines sent, ports scanned listen mode, for inbound connects

-L

listen harder, re-listen on socket close

-n

numeric-only IP addresses, no DNS

-o file

hex dump of traffic

-p port

local port number

-r -s addr

randomize local and remote ports local source address

-t

answer TELNET negotiation

-u

UDP mode

-v

verbose [use twice to be more verbose]

-w secs -z

timeout for connects and final net reads zero-I/O mode [used for scanning]

port numbers can be individual or ranges: m-n [inclusive]

C .

7D 9

%

/ K 1&(1NC? 7

kl k

,

?c 8 & %$ . (1 ? ( *;7 * C% 1 7 4% / ?%$ $ T U & ' K % % '$ 7% \ D ? 7 (1 '?% $ /H K % & V1 C 7% IS&% % $ ( /% 9 % (: ) N S$ 9 ? 7 E & C 1 Ps DJ& C% .>e %' / ! G $% 7(1 1E % (K* .(1 Nc –n * C P I?% 5! G (1 ?'? 7e %' C% :< ! G DNS Loockup ( *;79 1 1 % (K* .(1 Nc -v * $ / _ 5 1$ 8 Loockup( *$% 7\ . U(1 72 T1 25! G %$ 7 2F 1E ? 1 e %' $ C% D % % f < ? 42m DNS % M8 ! 1nOutBoundpo 4(1 PM ? I1 ? 1 o % C% . L ND ! q E ! 5#U E -v ; / . U(1 ? PM % % 5#U 1 .% D r51 ; /9 C . K % % D r51n-v -vp 7 /(D ! G (1 ; /9 & % )/ 71 1 .(1 ? D1 ! 5#U (. H ?

I1 ? 1 2&3

1 -v; / 1

&

<7 nc –w 3\

Nc -w ; /9 & % )/ 1 C 7% f7. PM (1 ; /9 & % )/

C 7 2F

- <7 <5$ / P
-u I1 udp PM Tcp (1 PM ? (1 ; /9 & % )/ 1 1 < PM \ $ udp ( U4(1 ( ,% 74 \ .& ? 1 ]/ (.Udp Socket Connected2E & C . % )/ udpB ? I1 W (1 % D D 7 ?EJ% / ?%$ $ & 4 & #<5udp PM 2:7 (Open Portp&1 ! udp ! $% < P/& C s K t U % ' ( E* 9 & 1 -4 5 /(.?% %9 1 1 % D \<5? .r51 % )/ %! ' * p 7! (<7(1 (1 C% (<
nRootp / /% 9 D1 5(1 YRQx & ? D % )/ C .O N \ 5 /]/ ! (.% D r51 ; /9 y /& ( : p%% *9 V % D % )/ ? 7! n%

1 1 . 7 ! & % )/ 9 1 &$ % )/ –r

(Listeningp % % S * Vc$ % C 7 2F 7 % % P% _^ /$ (1 . I $ Nc –l –p 1234
!

-v

$ e %' z PM ? 1 c 8 7 K % 1 . % )/ C% . 7 4 g c 8 (1 $ % K % ]/ PM H I $ P
-L % )/ ; /9 & % V PM 9 J % . I1 ? 1 C 1 I1 PM 9 J(W[,H % (.% D r51 $ H U(1 % . (< 4 7PM & . I $ PM K % W $ -I? 7 & % )/ 1 % ?

\ ^ .–DGAPING_SECURITY_HOLE 1 * & V1 1 (. L ND ? ( 1 -Ey / 1 Vc$ % ( E*9 % . .% TK PM H K % C 1 inted <7 % % S * C% ( 1 H ]8 KT U9 1 (.!$ )9 1 u==CCC &% 1 < I9 +j 19 1 1 (.? .& < * $ PVK?% 5 , % .(V I9 { 1 !0, '& _ = 79| < ( *;7P/ $ 1 W % ? ( 1? (. . I % C% 1 7 4 ? \ KH & % 1? ( 1? MI . _ C . % )/ ^ / ? (/% 1 \ ^ .-DTLENET 1 * C . 7K -? 7( E*(1 */ -T; / $ % \G$ -? 7% _ $ /(1 (-/$ 9 1 71 2F Login(1 / (, $ ! .0 < PVKs Kf U(1 % % m ( '\, % (1 9 1 . 1 2&3 * 1 .! 5#U (1 ( 1p 1 n .PVK ( E*

%

.9 D1 1 (D<7% K % ( & (.? 7 % % C% D % % \ [ % / $ 4(1 1 -.} ? 7( 1 , $% P/ ( (1 ! G 9 (1 E % / ?%$ $ U(1 P/ 5 /(. 9 V &( K -i; / C 7 f7. \1 I 1

o 4? % bD.? 1 ,$ S$ ! f % : ! G 9 (1 % 4? 7 & V1 (.?EJ 7$ M8 $ 1E e %'_^ /z; / 1 (1 (.% V! < 2 5(1 1 f 1 * C% o % E m-n2 K(1 ! & ? %$ [ \ \G$ + (1 '2< (1 1 L ND ! H C 7% ? 7 % % '(<7(1 $ % 2$% P/ bI r51 M8 ! H & f 1 .> C% D % G ? 4 -z; /& 1 % % P/ $ 1 ! f 2F ? 1 &P % % )/ Nc –v –w2 –z target 130-140 ? 7! % % V/140 130 _ $ / J .f t7 C 1 %$ [ 9 %netbios epmap ? 7 7%

%%O $ 9 / YxR YZR& ? 7! 31 \ % & 1 (1 B 1 + (1 (.YZ~$ YZ`? 7! (. C / &1 1 • ?$ % .H <. 7>)$ 7 .& ? 1 % ! f & 1 I9 7 79 1 1 [ ? 7\, %9 < & C 1

€ J13 C

4 '< (1 < ? 1

7 K $ 7; /& " 1 ([) G9 IJ9 ? 7 .& " 1 P

Telnet?

(1

& % )/

b-N ? 7Daemon 1 / % I(.? E1 5(1 ' O (1 - < I E1 ? 1 O 4 D z .(<, PM ? 1Nc Host 25\ (1 & % )/ P 5(1 1 ((Smtpp 2e \ 7% _ $ /H (<, $ 1 E g (1 %/

Mail Bomber(FakeMail)H

? (1 -& (.( * <7 C % . <7 7 & % . % )/ ? IJ9 1 < D1 '? 1 H J .P H 9 (, 7 2F - 1 < (.? 7 .$ 1 .(<7 C% % 2F H J .( 1 9 1

Port Scaning ! ( 19 ! .f

f ? 7 E & :%

C 1 9 <. % t 7? 7! H <. < (1 E 9 C% % L ND ( 1$ &1 ? 7! $ % .f & 2 H O N (1 % I 7H * • ) *(,8 \$ % •% 1 7 4 EK2 9 9 < 1 >)? 1 EK ? 7 EK2 9 < .>)? (1 7 4(1 < * Ip Scaner , Port Scaner ,file Transfer , Script uploader H & % )/ (1 % I < , $ % 7 42&3 & … €=== 7 9 $9 1_ 7 EK2 ( & /% K. 7! % .9 / ? 1 Nc –v –w2 Target FirstPort-EndPort n=% D 9 / t 7QQQ Y ! & &P %p &P Nc –v –w2 192.168.159.126 1-222

t 7&1 ? 7!

YZ~$ YZ`? 7!

(.

31 \ % C9 7

7% _ $ /? 7Banner? $'A< (J 7!

1 7 4(1 < (. ! I $ "V1 u= / .P % ? 7% _ $ / / 7 1 ? $'A< ! G M4& :% & /% K]4 % .9 ? 1 Nc –v –n Target Port Number D < (1 P ? 1 }R$ QY ? 7! &? 7P % = 7 H J QY ! P$ P % Nc –v –n 192.168.1.90 21

(1 !

"V1 D

&

7% _ $ /$ QY !

&

5#U 31 \

}R! 2$% P Nc –v –n 192.168.1.90 21

7

C% / 1 E }R! 31 \ % < ) * ! Q 9 P ? 1 ]8 K C .H J

!"#$%&' " % )/ O$ % / 7% _ $ /H C 7%

& C% < I% 4Html\ KP$ % Http / ]8 K K. / % &\ K <7 -K9 1 1

Http/1.0 200 OK Centent-type: text/plain Content-length: 724 .

5(1

. . . 4>Index.htm2 1 & K1

C

C Nc –l –p 80 < index.htm ,M 7? 1$ 7 S *}R! 7 ^ /

.9 1

\ K9 $ (% %

(1 /% 9 TU C% D % / K_. \ K < % 1 P H ]8 K9 C /) 1

() * Flooding ? 7% 1 .? 1 t M P$ K z; /zO

1 ? 7%% &( % . ? 1 C% D % )/ * * ( b-N ? E % .H J(C 1 ) 1 CCC$ \ 5t j % . % )/ &% .9 ? 1

% D &

1$ 't M 1 ? 7 % % & ?% &H K r51 .9 , . % (.% D r51-v ; /& % )/ C . 4> % P/ ? 7 % %

ß‚a¢k Hât Ha¢ker’s

n / #.p 7H 1?7 & ( = ' (1 4? 7 1 D1

P $ƒ9 % :1 1 ) *

Emperor Team

7 / #.(G 5 % O 4? 7 & U ^ 9 * E1 & /QR~R?31 % .H 7 1 9 1 = _ )% ? 7 ? 72 (1 1 "5„ ? % (. 9 IM4N,Y4Ho0,BuG,Cl4w,EimaN,@RASH&Turbo C Im4n 1 9 (.

? 7( 1 (1 9 … E1 ? 7 .& =% . Ybad 1,YBad 1.5,WinNC / _ )% 9 ]/ (.t$ V ? 7 /& ?7 / H & $ *z TU (.S $ S& ' z2E &( 4 . 9 $EI% &' :D %zb :D %zP K / ).z ' CCC $ % ^ <.z% ! &$z YY}z
?7

Im4n Emperor "5 1 7 9 ? 7 )% & (. 9 9 %' + 1 7& 79 $% : @<7 * E1

1

7

Im4n-Y4ho0 U ^ (1 t$ V . $ *9 ? "5 & :% C 1 U ^ _ )% ? "5 & :% (.

Lord Cracker-IranMatrix-Mohmad Shabgard-Danil-Im4n

Author: Satanic Soulful E-Mail: [email protected] [email protected] Developed In:Satanic Digital Network Security ™ Special TNX 2 :Hell Hacker – Collector – S_hahroo_Z - Kami Research By:5/-\t4N1C ©®Copyright For : Satanic Team 2005-2006 For More Information Go to Http://Hack-er.cjb.net/

©®All Right Reserved For Shabgard Security † Mr.XShabgardX 2005-2006 For More Information Visit:Http://Shabgard.Org/ My Deram Is All Day For Girl Is Dark&Ominous,

Related Documents

Netcat
November 2019 6
Netcat
November 2019 13
Netcat Commands
November 2019 11
Denny-netcat
November 2019 13
Netcat Para Ignorantes
November 2019 11