to what the Ncat help looks like… ncat -h Ncat 7.91 ( ) Usage: ncat Options taking a time assume seconds. h this cruft -i secs delay interval for lines sent, ports scanned -k set keepalive option on socket -l listen mode, for inbound connects -n numeric-only IP addresses, no DNS -o file hex dump of traffic -p port local port number -r randomize local and remote ports -q secs quit after EOF on stdin and delay of secs -s addr local source address -T tos set Type Of Service -t answer TELNET negotiation -u UDP mode -v verbose -w secs timeout for connects and final net reads -C Send CRLF as line-ending -z zero-I/O mode port numbers can be individual or ranges: lo-hi hyphens in port names must be backslash escaped (e.g. listen for inbound: nc -l -p port options: -c shell commands as `-e' use /bin/sh to exec -e filename program to exec after connect -b allow broadcasts -g gateway source-routing hop point, up to 8 -G num source-routing pointer: 4, 8, 12. This is what the Netcat help looks like… nc -h connect to somewhere: nc hostname port. It is based on Netcat but developed into a much more sophisticated tool by the Nmap project. Ncat however is not the same as Netcat or Nc. I believe there are also unofficial versions that run on Windows as well. It is available on all Linux and macOS operating systems. It can however be extremely helpful with ethical hacking and penetration testing. Netcat or abbreviated Nc was developed by “Hobbit” in October 1995 and is officially considered a network administration tool.
0 Comments
Leave a Reply. |