Kali Linux combat articles: Netcat backdoor program use articles

2020-08-02 10:00:13 0 Comment 855 views
abstract

Disclaimer: All sharing of this official account [the most complete database] is only for learning exchanges! Please don't use it! What is Netcat? NC

Declaration: All sharing of this official account [the most complete database] is only for learning exchanges! Please don't use it!

Kali Linux combat articles: Netcat backdoor program use articles

What is Netcat

NC (netcat) is called the Swiss Army Knife of network tools, small in size, but powerful.

Main functions of Nc

Nc can interact with each other on two devices, namely listening mode/transmission mode

Telnet function

Get banner information

Transfer text information

TransmitInput files/directories

encrypted transmission files, not encrypted by default

remote control

encrypt all traffic

streaming media server

Remote clone hard disk

Specific introduction

Before that, let's take a look at the parameter description.

nc -h

Kali Linux combat articles: Netcat backdoor program use articles

image .png

-c shell commands shell mode

-e filenameProgram redirection [Dangerous!!]

-b Allow broadcasting

-d No command line interface, use background mode

-g gateway Source routing jumping point , No more than 8

-G num source routing indicator: 4, 8, 12, ...

-h Get help information

-i secs Delay setting, use during port scanning

-k Set the survival option on the socket

-l Monitor inbound information

-n Expressed in digital form IP address

-ofile decimal record

-p port local port

-r random local and remote ports

-q secs exit after standard input and delay (translated Not very good, the following examples will introduce)

-s addr local source address

-T tos set service type

-t respond inbound in the form of TELNET Request

-u UDP mode

-v show detailed information [use=vv to get more detailed information

-w secs connection timeout setting

-zI/O mode [used during scanning]

In fact, there are a few commonly used parameters

.

NC remote control

This is more interesting, I put it first.

Forward connection

A sends his Bash to B

Reverse connection

B sends his Bash to A

Change Bash to cmd under win

Kali Linux combat articles: Netcat backdoor program use articles

image.png

Kali Linux combat articles: Netcat backdoor program use articles

image.png

image.png

Usually reverse connection is more common, because the firewall Exist, let the target machine actively send the shell

Below is the demo

Kali Linux combat articles: Netcat backdoor program use articles

hackerwing.com

Use NC for information collection

Simple establishment Connection is the listening mode and transmission mode

Monitor the specified port number

connection pairParty tcp port, by default, both parties can send text messages

Collect process information on the target machine

Save the remotely sent content locally

Standard Delay one second after the input is completed, and it will be sent to the listening end

Kali Linux combat articles: Netcat backdoor program use articles

wing

Kali Linux combat articles: Netcat backdoor program use articles

wing

Kali Linux combat articles: Netcat backdoor program use articles

wing

NC transfer file/directory

1.txt is the file name customization you want to save

Send the file to the listener

The file name of the listener is best named after the file itself

Pack the directory

Unpack the directory

NC file encrypted transmission

Understanding: B encrypts and sends the file, A accepts it, decrypts it and saves it locally, and B exits.

Mainly use mcrypt for encryption

NC streaming media service

A lets this file become a stream and sends it to B. B uses mplayer to play it. It can be played as much as it receives, and the cache is 4000 bytes.

NC port scan

Kali Linux combat articles: Netcat backdoor program use articles

image.png

By default, tcp is used for scanning

NC copy disk

Yes

Yes

B copies the data to the hard disk mounted by A

avatar