Instant Netcat Starter
By K.C. Yerrid
4/5
()
About this ebook
Related to Instant Netcat Starter
Related ebooks
Building Virtual Pentesting Labs for Advanced Penetration Testing Rating: 0 out of 5 stars0 ratingsMetasploit Bootcamp Rating: 5 out of 5 stars5/5Penetration Testing Bootcamp Rating: 5 out of 5 stars5/5Kali Linux Cookbook Rating: 4 out of 5 stars4/5Penetration Testing with BackBox Rating: 0 out of 5 stars0 ratingsMaking Passwords Secure Rating: 0 out of 5 stars0 ratingsLearning Network Forensics Rating: 5 out of 5 stars5/5The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy Rating: 0 out of 5 stars0 ratingsStealing the Network: How to Own an Identity: How to Own an Identity Rating: 4 out of 5 stars4/5Wireshark & Ethereal Network Protocol Analyzer Toolkit Rating: 0 out of 5 stars0 ratingsThe Basics of Web Hacking: Tools and Techniques to Attack the Web Rating: 0 out of 5 stars0 ratingsMastering Kali Linux for Web Penetration Testing Rating: 4 out of 5 stars4/5Cyber Forensics Up and Running: A hands-on guide to digital forensics tools and technique (English Edition) Rating: 0 out of 5 stars0 ratingsCEH v9: Certified Ethical Hacker Version 9 Study Guide Rating: 0 out of 5 stars0 ratingsSolarWinds Orion Network Performance Monitor Rating: 0 out of 5 stars0 ratingsNetcat Power Tools Rating: 3 out of 5 stars3/5Nmap 6: Network Exploration and Security Auditing Cookbook Rating: 0 out of 5 stars0 ratingsKali Linux Web Penetration Testing Cookbook Rating: 0 out of 5 stars0 ratingsWarDriving: Drive, Detect, Defend: A Guide to Wireless Security Rating: 3 out of 5 stars3/5Nmap: Network Exploration and Security Auditing Cookbook - Second Edition Rating: 0 out of 5 stars0 ratingsMetasploit Penetration Testing Cookbook Rating: 0 out of 5 stars0 ratingsWeb Penetration Testing with Kali Linux - Second Edition Rating: 0 out of 5 stars0 ratingsKali Linux – Assuring Security by Penetration Testing Rating: 3 out of 5 stars3/5Nmap in the Enterprise: Your Guide to Network Scanning Rating: 0 out of 5 stars0 ratingsBuffer Overflow Attacks: Detect, Exploit, Prevent Rating: 4 out of 5 stars4/5Seven Deadliest Network Attacks Rating: 3 out of 5 stars3/5Building a Pentesting Lab for Wireless Networks Rating: 0 out of 5 stars0 ratingsKali Linux CTF Blueprints Rating: 0 out of 5 stars0 ratings
Security For You
Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Hacking For Dummies Rating: 4 out of 5 stars4/5Destination CISSP Rating: 3 out of 5 stars3/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Cybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsCybersecurity For Dummies Rating: 4 out of 5 stars4/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Ethical Hacking 101 - How to conduct professional pentestings in 21 days or less!: How to hack, #1 Rating: 5 out of 5 stars5/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Amazon Web Services (AWS) Interview Questions and Answers Rating: 5 out of 5 stars5/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Handbook of Digital Forensics and Investigation Rating: 4 out of 5 stars4/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsHow to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5
Reviews for Instant Netcat Starter
1 rating0 reviews
Book preview
Instant Netcat Starter - K.C. Yerrid
Table of Contents
Instant Netcat Starter
Credits
About the author
Acknowledgement
About the reviewer
www.packtpub.com
Support files, eBooks, discount offers and more
packtLib.packtPub.com
Why Subscribe?
Free Access for Packt account holders
1. Instant Netcat Starter
So, what is Netcat?
Common uses for Netcat
Installation
For all supported platforms
Step 1 – what do I need?
For Windows installations
Step 2 – downloading Netcat from the Internet
Step 3 – extracting Netcat from ZIP archive
Step 4 – verifying program operation
For Linux/Unix installations (Unix Netcat Installation)
Step 2 – downloading Netcat from the Internet
Step 3 – installing Unix Netcat
Step 4 – verifying program operation
For Linux/Unix installations (GNU Netcat Installation)
Step 2 – downloading GNU Netcat from the Internet
Step 3 – compiling and installing GNU Netcat
Step 4 – verifying program operation
Nmap Project's Ncat (All distributions)
And that's it
Quick start – the basics of Netcat
Step 1 – using Netcat for a simple chat interface
Step 2 – transferring data with Netcat
Step 3 – banner grabbing with Netcat
Top 3 features you'll want to know about
Using Netcat to get a remote shell on a target computer
Windows remote shell (and simple post-exploitation hi-jinks)
Preparing the listener
Connecting to the target
Running a directory listing on the target
Making a directory on the target
Verifying directory was created
Adding a local user and granting administrator rights
Linux remote shell
Preparing the listener
Connecting to the target
Running a directory listing on the target
Making a directory on the target
Verifying if the directory was created
Adding a local user and placing into the root group
Port scanning with Netcat
Basic port scanning against a target
Randomized port scanning against a target
More verbose scanning against a target
Scanning a range of devices with a script
Other key Netcat switches
People and places you should get to know
Official sites
Articles and tutorials
Blogs and websites
Instant Netcat Starter
Instant Netcat Starter
Copyright © 2013 Packt Publishing
All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews.
Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book.
Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information.
First published: January 2013
Production Reference: 1170113
Published by Packt Publishing Ltd.
Livery Place
35 Livery Street
Birmingham B3 2PB, UK.
ISBN 978-1-84951-996-0
www.packtpub.com
Credits
Author
K.C. K0nsp1racy
Yerrid
Reviewer
Jonathan Craton
IT Content and Commissioning Editor
Grant Mizen
Commissioning Editor
Priyanka Shah
Technical Editor
Ameya Sawant
Copy Editor
Alfida Paiva
Project Coordinators
Shraddha Bagadia
Esha Thakker
Proofreader
Kelly Hutchison
Graphics
Aditi Gajjar
Production Coordinator
Melwyn D'sa
Cover Work
Melwyn D'sa
Cover Image
Conidon Miranda
About the author
K.C. Yerrid has built his career through hard work, efficiency, and sheer determination. He can be described as an information security thought leader and a