Netcat#

Another one of the very versatile fundamentals of exploitation, netcat is one of those programs that becomes second nature to an Ethical Hacker.


Setting up a Listener#

A number of exploits create a ‘reverse shell’, in which the exploited machine calls back to the attacker. Part of this, is that you must set up a listener to recieve this call.

nc -lvnp [port]

  • l -> Listen

  • v -> verbose logging

  • n -> dont resolve DNS

  • p -> next arguement is the port to listen on