Netcat power tools
Netcat in one of the most commonly used anti-hacking tools in the world. It reads and writes data across network connections, using the TCP/IP protocol. It is designed to be a reliable ""back-end"" tool that can be used directly or easily driven by other programs and scripts. At...
Otros Autores: | , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Burlington, MA :
Syngress Publishing
c2008.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627532906719 |
Tabla de Contenidos:
- Front Cover; Netcat Power Tools; Technical Editor; Contributing Authors; Contents; Chapter 1: Introduction to Netcat; Introduction; Installation; Windows Installation; Linux Installation; Installing Netcat as a Package; Installing Netcat from Source; Confirming Your Installation; Netcat's Command Options; Modes of Operation; Common Command Options; Redirector Tools; Basic Operations; Simple Chat Interface; Port Scanning; Transferring Files; Banner Grabbing; Redirecting Ports and Traffic; Other Uses; Summary; Solutions Fast Track; Introduction; Installation; Options; Basic Operations
- Frequently Asked QuestionsChapter 2: Netcat Penetration Testing Features; Introduction; Port Scanning and Service Identification; Using Netcat as a Port Scanner; Banner Grabbing; Scripting Netcat to Identify Multiple Web Server Banners; Service Identification; Egress Firewall Testing; System B - The System on the Outside of the Firewall; System A - The System on the Inside of the Firewall; Avoiding Detection on a Windows System; Evading the Windows XP/Windows 2003 Server Firewall; Example; Making Firewall Exceptions using Netsh Commands; Determining the State of the Firewall
- Evading Antivirus DetectionRecompiling Netcat; Creating a Netcat Backdoor on a Windows XP or Windows 2003 Server; Backdoor Connection Methods; Initiating a Direct Connection to the Backdoor; Benefit of this Method; Drawbacks to this Method; Initiating a Connection from the Backdoor; Benefits of this Connection Method; Drawback to this Method; Backdoor Execution Methods; Executing the Backdoor using a Registry Entry; Benefits of this Method; Drawback to this Method; Executing the Backdoor using a Windows Service; Benefits of this Method; Drawback to this Method
- Executing the Backdoor using Windows Task SchedulerBenefit to this Method; Backdoor Execution Summary; Summary; Solutions Fast Track; Port Scanning and Service Identification; Egress Firewall Testing; Avoid Detection on a Windows System; Creating a Netcat Backdoor on a Windows XP or Windows 2003 Server; Frequently Asked Questions; Chapter 3: Enumeration and Scanning with Netcat and Nmap; Introduction; Objectives; Before You Start; Why Do This?; Approach; Scanning; Enumeration; Notes and Documentation; Active versus Passive; Moving On; Core Technology; How Scanning Works; Port Scanning
- Going behind the Scenes with EnumerationService Identification; RPC Enumeration; Fingerprinting; Being Loud, Quiet, and All That Lies Between; Timing; Bandwidth Issues; Unusual Packet Formation; Open Source Tools; Scanning; Nmap; Nmap: Ping Sweep; Nmap: ICMP Options; Nmap: Output Options; Nmap: Stealth Scanning; Nmap: OS Fingerprinting; Nmap: Scripting; Nmap: Speed Options; Netenum: Ping Sweep; Unicornscan: Port Scan and Fuzzing; Scanrand: Port Scan; Enumeration; Nmap: Banner Grabbing; Netcat; P0f: Passive OS Fingerprinting; Xprobe2: OS Fingerprinting; Httprint; Ike-scan: VPN Assessment
- Amap: Application Version Detection