Netcat, Cryptcat, and Ncat: The Swiss Army knives of hacking.
Introduction and objectives We are going to study the functioning and behavior of these tools, which provide the pentester with a range of opportunities in system auditing. You can download them from the following links: In the practical exercise we are going to perform in this article, we will learn how to obtain a remote machine’s command shell by using these tools. Subsequently, we will also conduct a study of the network traffic generated using each of these tools, with the aim of understanding communication security. Obtaining a “bind shell” in a LAN. a) Machines used for the practice To …