Instant Netcat Starter
By K.C. Yerrid
4/5
()
About this ebook
Related to Instant Netcat Starter
Related ebooks
Penetration Testing with BackBox Rating: 0 out of 5 stars0 ratingsKali Linux Cookbook Rating: 4 out of 5 stars4/5Learning Network Forensics Rating: 5 out of 5 stars5/5CEH v9: Certified Ethical Hacker Version 9 Study Guide Rating: 0 out of 5 stars0 ratingsMaking Passwords Secure Rating: 0 out of 5 stars0 ratingsTribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurity Rating: 0 out of 5 stars0 ratingsMetasploit Bootcamp Rating: 5 out of 5 stars5/5Kali Linux – Assuring Security by Penetration Testing Rating: 3 out of 5 stars3/5Penetration Testing with Raspberry Pi Rating: 5 out of 5 stars5/5Mastering the Nmap Scripting Engine Rating: 0 out of 5 stars0 ratingsThe Art of Network Penetration Testing: How to take over any company in the world Rating: 0 out of 5 stars0 ratingsNmap 6: Network Exploration and Security Auditing Cookbook Rating: 0 out of 5 stars0 ratingsInstant Traffic Analysis with Tshark How-to Rating: 0 out of 5 stars0 ratingsBuilding Virtual Pentesting Labs for Advanced Penetration Testing Rating: 0 out of 5 stars0 ratingsGray Hat Hacking the Ethical Hacker's Rating: 5 out of 5 stars5/5Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless Rating: 0 out of 5 stars0 ratingsMastering Metasploit Rating: 0 out of 5 stars0 ratingsBSD UNIX Toolbox: 1000+ Commands for FreeBSD, OpenBSD and NetBSD Rating: 0 out of 5 stars0 ratingsUnderstanding Network Hacks: Attack and Defense with Python Rating: 0 out of 5 stars0 ratingsLearning zANTI2 for Android Pentesting Rating: 0 out of 5 stars0 ratingsLearning iOS Penetration Testing Rating: 0 out of 5 stars0 ratingsKali Linux Network Scanning Cookbook Rating: 0 out of 5 stars0 ratingsKali Linux Penetration Testing Bible Rating: 0 out of 5 stars0 ratingsMetasploit Penetration Testing Cookbook Rating: 0 out of 5 stars0 ratingsKali Linux CTF Blueprints Rating: 0 out of 5 stars0 ratingsPenetration Testing with Kali Linux: Learn Hands-on Penetration Testing Using a Process-Driven Framework (English Edition) Rating: 0 out of 5 stars0 ratingsWeb Penetration Testing with Kali Linux - Second Edition Rating: 0 out of 5 stars0 ratingsHack the Airwaves: Advanced BLE Exploitation Techniques Rating: 0 out of 5 stars0 ratings
Security For You
How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5CompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701 Rating: 0 out of 5 stars0 ratingsIAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsMake Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Wireless Hacking 101 Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Cybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsCybersecurity For Dummies Rating: 5 out of 5 stars5/5Blockchain Basics: A Non-Technical Introduction in 25 Steps Rating: 4 out of 5 stars4/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsHow to Hack Like a Pornstar Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Hacking For Dummies Rating: 4 out of 5 stars4/5CompTIA Network+ Practice Tests: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCodes and Ciphers Rating: 5 out of 5 stars5/5Deep Dive: Exploring the Real-world Value of Open Source Intelligence Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsApple Card and Apple Pay: A Ridiculously Simple Guide to Mobile Payments Rating: 0 out of 5 stars0 ratingsCompTIA CySA+ Study Guide: Exam CS0-003 Rating: 2 out of 5 stars2/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5CISM Certified Information Security Manager Study Guide Rating: 4 out of 5 stars4/5Cybersecurity for Beginners : Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide: 1 Rating: 0 out of 5 stars0 ratings
Reviews for Instant Netcat Starter
1 rating0 reviews
Book preview
Instant Netcat Starter - K.C. Yerrid
Table of Contents
Instant Netcat Starter
Credits
About the author
Acknowledgement
About the reviewer
www.packtpub.com
Support files, eBooks, discount offers and more
packtLib.packtPub.com
Why Subscribe?
Free Access for Packt account holders
1. Instant Netcat Starter
So, what is Netcat?
Common uses for Netcat
Installation
For all supported platforms
Step 1 – what do I need?
For Windows installations
Step 2 – downloading Netcat from the Internet
Step 3 – extracting Netcat from ZIP archive
Step 4 – verifying program operation
For Linux/Unix installations (Unix Netcat Installation)
Step 2 – downloading Netcat from the Internet
Step 3 – installing Unix Netcat
Step 4 – verifying program operation
For Linux/Unix installations (GNU Netcat Installation)
Step 2 – downloading GNU Netcat from the Internet
Step 3 – compiling and installing GNU Netcat
Step 4 – verifying program operation
Nmap Project's Ncat (All distributions)
And that's it
Quick start – the basics of Netcat
Step 1 – using Netcat for a simple chat interface
Step 2 – transferring data with Netcat
Step 3 – banner grabbing with Netcat
Top 3 features you'll want to know about
Using Netcat to get a remote shell on a target computer
Windows remote shell (and simple post-exploitation hi-jinks)
Preparing the listener
Connecting to the target
Running a directory listing on the target
Making a directory on the target
Verifying directory was created
Adding a local user and granting administrator rights
Linux remote shell
Preparing the listener
Connecting to the target
Running a directory listing on the target
Making a directory on the target
Verifying if the directory was created
Adding a local user and placing into the root group
Port scanning with Netcat
Basic port scanning against a target
Randomized port scanning against a target
More verbose scanning against a target
Scanning a range of devices with a script
Other key Netcat switches
People and places you should get to know
Official sites
Articles and tutorials
Blogs and websites
Instant Netcat Starter
Instant Netcat Starter
Copyright © 2013 Packt Publishing
All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews.
Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book.
Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information.
First published: January 2013
Production Reference: 1170113
Published by Packt Publishing Ltd.
Livery Place
35 Livery Street
Birmingham B3 2PB, UK.
ISBN 978-1-84951-996-0
www.packtpub.com
Credits
Author
K.C. K0nsp1racy
Yerrid
Reviewer
Jonathan Craton
IT Content and Commissioning Editor
Grant Mizen
Commissioning Editor
Priyanka Shah
Technical Editor
Ameya Sawant
Copy Editor
Alfida Paiva
Project Coordinators
Shraddha Bagadia
Esha Thakker
Proofreader
Kelly Hutchison
Graphics
Aditi Gajjar
Production Coordinator
Melwyn D'sa
Cover Work
Melwyn D'sa
Cover Image
Conidon Miranda
About the author
K.C. Yerrid has built his career through hard work, efficiency, and sheer determination. He can be described as an information security thought leader and a