http://pan.baidu.com/s/1bo2IH9X#netcat  云盘下载
[root@bass ~]# tar -xjvf netcat-0.7.1.tar.bz2

[root@bass ~]# cd netcat-0.7.1
[root@bass ~]# ./configure --prefix=/usr/local/netcat
[root@bass ~]# make && make install
[root@bass ~]# tree /usr/local/netcat/
/usr/local/netcat/
├── bin
│   ├── nc -> netcat
│   └── netcat
├── info
│   ├── dir
│   └── netcat.info
├── man
│   └── man1
│   └── netcat.1
└── share
└── locale
├── it
│   └── LC_MESSAGES
│   └── netcat.mo
└── sk
└── LC_MESSAGES
└── netcat.mo 10 directories, 7 files
[root@bass ~]# nc -h
usage: nc [-46DdhklnrStUuvzC] [-i interval] [-p source_port]
[-s source_ip_address] [-T ToS] [-w timeout] [-X proxy_version]
[-x proxy_address[:port]] [hostname] [port[s]]
Command Summary:
-4 Use IPv4
-6 Use IPv6
-D Enable the debug socket option
-d Detach from stdin
-h This help text
-i secs Delay interval for lines sent, ports scanned
-k Keep inbound sockets open for multiple connects
-l Listen mode, for inbound connects
-n Suppress name/port resolutions
-p port Specify local port for remote connects
-r Randomize remote ports
-S Enable the TCP MD5 signature option
-s addr Local source address
-T ToS Set IP Type of Service
-C Send CRLF as line-ending
-t Answer TELNET negotiation
-U Use UNIX domain socket
-u UDP mode
-v Verbose
-w secs Timeout for connects and final net reads
-X proto Proxy protocol: "4", "5" (SOCKS) or "connect"
-x addr[:port] Specify proxy address and port
-z Zero-I/O mode [used for scanning]
Port numbers can be individual or ranges: lo-hi [inclusive]

扫描21-9000端口TCP:

[root@bass ~]# nc -v -w 2 192.168.1.35 -z 21-9000

-v 详细输出 -w secs timeout的时间 -z 端口的范围

扫描21-80端口UDP

[root@bass ~]# nc -z -v -u -n 122.56.183.103 21-80
Connection to 122.56.183.103 27 port [udp/*] succeeded!
Connection to 122.56.183.103 37 port [udp/*] succeeded!
Connection to 122.56.183.103 41 port [udp/*] succeeded!
Connection to 122.56.183.103 44 port [udp/*] succeeded!
Connection to 122.56.183.103 50 port [udp/*] succeeded!
Connection to 122.56.183.103 62 port [udp/*] succeeded!
Connection to 122.56.183.103 65 port [udp/*] succeeded!
Connection to 122.56.183.103 69 port [udp/*] succeeded!
Connection to 122.56.183.103 80 port [udp/*] succeeded!

扫描21-80端口TCP

[root@bass ~]# nc -z -v -n 122.56.183.103 21-80
Connection to 122.56.183.103 21 port [tcp/*] succeeded!
Connection to 122.56.183.103 22 port [tcp/*] succeeded!
nc: connect to 122.56.183.103 port 23 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 24 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 25 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 26 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 27 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 28 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 29 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 30 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 31 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 32 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 33 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 34 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 35 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 36 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 37 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 38 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 39 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 40 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 41 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 42 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 43 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 44 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 45 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 46 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 47 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 48 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 49 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 50 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 51 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 52 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 53 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 54 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 55 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 56 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 57 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 58 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 59 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 60 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 61 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 62 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 63 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 64 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 65 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 66 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 67 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 68 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 69 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 70 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 71 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 72 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 73 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 74 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 75 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 76 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 77 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 78 (tcp) failed: Connection refused
nc: connect to 122.56.183.103 port 79 (tcp) failed: Connection refused
Connection to 122.56.183.103 80 port [tcp/*] succeeded!

netcat nc的更多相关文章

  1. Nmap / NetCat(nc) / 网络安全工具

    nmap - 网络探测工具和安全/端口扫描器 nmap [ <扫描类型> ...] [ <选项> ] { <扫描目标说明> } 描述 Nmap ("Net ...

  2. Linux 网络工具netcat(nc)的应用

    NETCAT netcat是Linux常用的网络工具之一,它能通过TCP和UDP在网络中读写数据,通过与其他工具结合和重定向,可以在脚本中以多种方式使用它. netcat所做的就是在两台电脑之间建立链 ...

  3. NC / Netcat - 反弹Shell

    原理 实验环境: 攻击机:windows机器,IP:192.168.12.109 受害机:linux机器,IP:192.168.79.1 攻击机:设置本地监听端口2222 C:\netcat>n ...

  4. NC / Netcat - 文件传输

    文件传输:将文件从B用户机器传输到A用户机器. 实验环境1: A用户,windows系统,IP:192.168.12.109 B用户,linux系统,IP:192.168.79.3 A用户作为接受传输 ...

  5. nc(netcat)扫描开放端口

    探测单个端口是否开放可以用telnet,专业探测端口可以用Nmap,而对于非渗透用途的Linux可以直接用netcat. 1.使用netcat探测端口是否开放 nc -z -v - #z代表不交互要不 ...

  6. 在linux下编译netcat并且反弹cmdshell(转载)

    本地Windows监听 nc -vv -l -p 1234   首先从sf上get一个tar的压缩包 wget http://sourceforge.net/projects/netcat/files ...

  7. Centos下安装nc命令工具安装以及使用

    1)netcat(nc)是一个简单而有用的工具,被誉为网络安全界的“瑞士军刀”,不仅可以通过使用TCP或UDP协议的网络连接读写数据,同时还是一个功能强大的网络调试和探测工具,能够建立你需要的几乎所有 ...

  8. nc命令的用法

    1.什么是nc netcat(nc)是一个简单而有用的工具,可以使用tcp或者udp进行网络间读写数据,传输文件,接收发送数据,验证网络是否畅通. 2.命令行: 1) -l 用于指定nc将处于侦听模式 ...

  9. Linux下反弹shell的种种方式

    [前言:在乌云社区看到反弹shell的几种姿势,看过之余自己还收集了一些,动手试了下,仅供参考] 0x01 Bash bash -i >& /dev/tcp/ >& 这里s ...

随机推荐

  1. iptables一些经常忘掉易混淆的参数

    -A:新增加一条规则,该规则在原规则的最后面 -p:规定应用于哪种数据包,例如:tcp,udp等 -d:(destination),表示目标IP或网络 -s:(source),表示源IP或网络 -j: ...

  2. rsync+inotify 实现服务器之间目录文件实时同步(转)

    软件简介: 1.rsync 与传统的 cp. tar 备份方式相比,rsync 具有安全性高.备份迅速.支持增量备份等优点,通过 rsync 可 以解决对实时性要求不高的数据备份需求,例如定期的备份文 ...

  3. IHttpModule在webconfig中的注册

    在asp.net中,提供了两种方式用来解决获取由asp.net服务器创建和维护的HttpApplication对象,方便注册HttpApplication对象的事件处理.这两种方式为:IHtpModu ...

  4. endnote参考文献格式设置

    endnote参考文献格式调整: 在office word 2010中加载了endnote x7插件之后,使用过程中发现格式有点乱,不该斜的地方斜体显示,该加方框[]的地方却没有方框,因此从网路上找资 ...

  5. SSRS匿名访问

    ---本人数据库是SqlServer2008 R2 匿名访问Reporting Service 2008 我想通过访问Url的方式,把部署到Sql Server  Reporting Service ...

  6. 十条nmap常用的扫描命令

    NMap也就是Network Mapper,nmap是在网络安全渗透测试中经常会用到的强大的扫描器,功能之强大,不言而喻.下面介绍一下它的几种扫描命令.具体的还是得靠大家自己学习,因为实在太强大了. ...

  7. xcode注释

    新开的项目需要先开发iOS版本,所以又把好久没写的iOS捡起来了,之前都是手动注释,最近是越来越懒了,所以在网上找了一个自动注释的插件,啊哈,其实有时候还真的挺怀念用Eclipse的时候,不过不用羡慕 ...

  8. maven最齐全配置pom.xml

    0001<project xmlns="http://maven.apache.org/POM/4.0.0"0002 0003xmlns:xsi="http://w ...

  9. Struts.xml讲解

    解决在断网环境下,配置文件无提示的问题我们可以看到Struts.xml在断网的情况下,前面有一个叹号,这时,我们按alt+/ 没有提示,这是因为” http://struts.apache.org/d ...

  10. linux 回收站的添加

    在~下     .bashrc或者.bash_profile加入 mkdir -p ~/.trash     alias rm=trash       trash()     {      mv $@ ...