Netcat power tools

Netcat in one of the most commonly used anti-hacking tools in the world. It reads and writes data across network connections, using the TCP/IP protocol. It is designed to be a reliable ""back-end"" tool that can be used directly or easily driven by other programs and scripts. At...

Descripción completa

Detalles Bibliográficos
Otros Autores: Kanclirz, Jan (-), Baskin, Brian
Formato: Libro electrónico
Idioma:Inglés
Publicado: Burlington, MA : Syngress Publishing c2008.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627532906719
Tabla de Contenidos:
  • Front Cover; Netcat Power Tools; Technical Editor; Contributing Authors; Contents; Chapter 1: Introduction to Netcat; Introduction; Installation; Windows Installation; Linux Installation; Installing Netcat as a Package; Installing Netcat from Source; Confirming Your Installation; Netcat's Command Options; Modes of Operation; Common Command Options; Redirector Tools; Basic Operations; Simple Chat Interface; Port Scanning; Transferring Files; Banner Grabbing; Redirecting Ports and Traffic; Other Uses; Summary; Solutions Fast Track; Introduction; Installation; Options; Basic Operations
  • Frequently Asked QuestionsChapter 2: Netcat Penetration Testing Features; Introduction; Port Scanning and Service Identification; Using Netcat as a Port Scanner; Banner Grabbing; Scripting Netcat to Identify Multiple Web Server Banners; Service Identification; Egress Firewall Testing; System B - The System on the Outside of the Firewall; System A - The System on the Inside of the Firewall; Avoiding Detection on a Windows System; Evading the Windows XP/Windows 2003 Server Firewall; Example; Making Firewall Exceptions using Netsh Commands; Determining the State of the Firewall
  • Evading Antivirus DetectionRecompiling Netcat; Creating a Netcat Backdoor on a Windows XP or Windows 2003 Server; Backdoor Connection Methods; Initiating a Direct Connection to the Backdoor; Benefit of this Method; Drawbacks to this Method; Initiating a Connection from the Backdoor; Benefits of this Connection Method; Drawback to this Method; Backdoor Execution Methods; Executing the Backdoor using a Registry Entry; Benefits of this Method; Drawback to this Method; Executing the Backdoor using a Windows Service; Benefits of this Method; Drawback to this Method
  • Executing the Backdoor using Windows Task SchedulerBenefit to this Method; Backdoor Execution Summary; Summary; Solutions Fast Track; Port Scanning and Service Identification; Egress Firewall Testing; Avoid Detection on a Windows System; Creating a Netcat Backdoor on a Windows XP or Windows 2003 Server; Frequently Asked Questions; Chapter 3: Enumeration and Scanning with Netcat and Nmap; Introduction; Objectives; Before You Start; Why Do This?; Approach; Scanning; Enumeration; Notes and Documentation; Active versus Passive; Moving On; Core Technology; How Scanning Works; Port Scanning
  • Going behind the Scenes with EnumerationService Identification; RPC Enumeration; Fingerprinting; Being Loud, Quiet, and All That Lies Between; Timing; Bandwidth Issues; Unusual Packet Formation; Open Source Tools; Scanning; Nmap; Nmap: Ping Sweep; Nmap: ICMP Options; Nmap: Output Options; Nmap: Stealth Scanning; Nmap: OS Fingerprinting; Nmap: Scripting; Nmap: Speed Options; Netenum: Ping Sweep; Unicornscan: Port Scan and Fuzzing; Scanrand: Port Scan; Enumeration; Nmap: Banner Grabbing; Netcat; P0f: Passive OS Fingerprinting; Xprobe2: OS Fingerprinting; Httprint; Ike-scan: VPN Assessment
  • Amap: Application Version Detection