Posts filed under Netcat

Penetration Test – Ghatering Phase. [Part 2]

This is a part of my article “Sharpen your axe with BackTrack – Gathering phase” published on PenTest Magazine and Hakin9 magazine. I have the right to do up to 100 downloads of these magazines, so If you are interested on it you can download PenTest Extra BackTrack Compendium 03_20132 or Hakin9 starter kit 03_20131… (read more)

Penetration Test – Ghatering Phase. [Part 1]

This is a part of my article “Sharpen your axe with BackTrack – Gathering phase” published on PenTest Magazine and Hakin9 magazine. I have the right to do up to 100 downloads of these magazines, so If you are interested on it you can download PenTest Extra BackTrack Compendium 03_20132 or Hakin9 starter kit 03_20131… (read more)

From a non interactive shell to an interactive one

As you can read at the end of this post a remote shell using command execution (-e cmd.exe or /bin/bash) isn’t a full interactive command prompt. These are solutions I found to have a more stable shell. Note that I don’t talk about a web remote shell as c99, c100, weevely or other php/asp code… (read more)

Some tricks using Netcat

If you are here, I suppose you know that Netcat (NC) is an utility which reads and writes data across network connections, using TCP or UDP transport. Nothing more, nothing less. Let’s see some exemples of use. First of all let’s read the help output: C:\>nc.exe -h [v1.11 NT www.vulnwatch.org/netcat/] connect to somewhere:   nc… (read more)