Home page logo

nmap-dev logo Nmap Development mailing list archives

Re: Your favorite Ncat/nc/Netcat trick?
From: Ron <ron () skullsecurity net>
Date: Mon, 02 Mar 2009 10:10:59 -0600

David Fifield wrote:
Hello again,

I'd like to have some more examples of fun, useful, or unusual things to
do with Ncat. I have a few of them, based on my own limited experience, at


What's your favorite Ncat trick? Did it (or nc, etc.) ever get you out
of a jam? Do you have any experiences that would make good examples for
the users' guide?

Here are a few web pages that might give you ideas:

My personal favorite trick is the parser-breaking DNS server I used to
test NSE in http://seclists.org/nmap-dev/2008/q4/0526.html and
http://seclists.org/nmap-dev/2009/q1/0317.html. I almost included that,
but then I thought it would require too much explanation.

David Fifield

Here's one I thought about last night...

This week on Dumb Netcat Tricks.... pushing a pcap over the network!

Box 1:
$ nc -vv -l -p 1234 > test.pcap

Box 2:
$ mknod pipe p
$ nc -vv (host) 1234 < pipe
# tcpdump -s0 -w pipe "port not 1234" &

(Will obviously have to background the middle netcat, or use two terminals)

This lets me, for example, monitor my router's traffic, and push it all back to my laptop where I can use wireshark to get a graphical view. I realize it isn't the most exciting thing, but eh?


Sent through the nmap-dev mailing list
Archived at http://SecLists.Org

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]