mailing list archives
Re: Your favorite Ncat/nc/Netcat trick?
From: Ron <ron () skullsecurity net>
Date: Mon, 02 Mar 2009 10:10:59 -0600
David Fifield wrote:
I'd like to have some more examples of fun, useful, or unusual things to
do with Ncat. I have a few of them, based on my own limited experience, at
What's your favorite Ncat trick? Did it (or nc, etc.) ever get you out
of a jam? Do you have any experiences that would make good examples for
the users' guide?
Here are a few web pages that might give you ideas:
My personal favorite trick is the parser-breaking DNS server I used to
test NSE in http://seclists.org/nmap-dev/2008/q4/0526.html and
http://seclists.org/nmap-dev/2009/q1/0317.html. I almost included that,
but then I thought it would require too much explanation.
Here's one I thought about last night...
This week on Dumb Netcat Tricks.... pushing a pcap over the network!
$ nc -vv -l -p 1234 > test.pcap
$ mknod pipe p
$ nc -vv (host) 1234 < pipe
# tcpdump -s0 -w pipe "port not 1234" &
(Will obviously have to background the middle netcat, or use two terminals)
This lets me, for example, monitor my router's traffic, and push it all
back to my laptop where I can use wireshark to get a graphical view. I
realize it isn't the most exciting thing, but eh?
Sent through the nmap-dev mailing list
Archived at http://SecLists.Org