Netcat – The TCP/IP Swiss Army Knife

Filed under Penetration Testing

Ahh..netcat..how useful you are to me! If you don’t use netcat for pen testing you absolutly have to. Good article below on how you can use netcat. Some examples:

* Outbound or inbound connections, TCP or UDP, to or from any ports
* Full DNS forward/reverse checking, with appropriate warnings
* Ability to use any local source port
* Ability to use any locally-configured network source address
* Built-in port-scanning capabilities, with randomizer
* Built-in loose source-routing capability
* Can read command line arguments from standard input
* Slow-send mode, one line every N seconds
* Optional ability to let another program service inbound connections

Netcat – The TCP/IP Swiss Army Knife

Comments are closed.