• Free Shipping Icon

    This Item Qualifies for Free Shipping!*

    *Excludes marketplace orders.

List Price: $62.95

Buy New

Usually Ships in 5-7 Business Days
$62.89

Rent Textbook

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:1825 Days access
Downloadable:Lifetime Access
$71.94
*To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.
$71.94*

Used Textbook

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

Originally released in 1996, Netcat is a networking program designed to read and write data across both Transmission Control Protocol TCP and User Datagram Protocol (UDP) connections using the TCP/Internet Protocol (IP) protocol suite. Netcat is often referred to as a "Swiss Army knife" utility, and for good reason. Just like the multi-function usefulness of the venerable Swiss Army pocket knife, Netcat's functionality is helpful as both a standalone program and a back-end tool in a wide range of applications. Some of the many uses of Netcat include port scanning, transferring files, grabbing banners, port listening and redirection, and more nefariously, a backdoor. This is the only book dedicated to comprehensive coverage of the tool's many features, and by the end of this book, you'll discover how Netcat can be one of the most valuable tools in your arsenal. Book jacket.

Table of Contents

Introduction to Netcatp. 1
Introductionp. 2
Installationp. 3
Windows Installationp. 3
Linux Installationp. 5
Installing Netcat as a Packagep. 6
Installing Netcat from Sourcep. 7
Confirming Your Installationp. 10
Netcat's Command Optionsp. 11
Modes of Operationp. 11
Common Command Optionsp. 12
Redirector Toolsp. 18
Basic Operationsp. 19
Simple Chat Interfacep. 19
Port Scanningp. 20
Transferring Filesp. 21
Banner Grabbingp. 23
Redirecting Ports and Trafficp. 24
Other Usesp. 25
Summaryp. 26
Solutions Fast Trackp. 27
Frequently Asked Questionsp. 28
Netcat Penetration Testing Featuresp. 31
Introductionp. 32
Port Scanning and Service Identificationp. 32
Using Netcat as a Port Scannerp. 32
Banner Grabbingp. 34
Scripting Netcat to Identify Multiple Web Server Bannersp. 35
Service Identificationp. 36
Egress Firewall Testingp. 36
System B - The System on the Outside of the Firewallp. 37
System A - The System on the Inside of the Firewallp. 39
Avoiding Detection on a Windows Systemp. 40
Evading the Windows XP/Windows 2003 Server Firewallp. 40
Examplep. 41
Making Firewall Exceptions using Netsh Commandsp. 41
Determining the State of the Firewallp. 42
Evading Antivirus Detectionp. 44
Recompiling Netcatp. 44
Creating a Netcat Backdoor on a Windows XP or Windows 2003 Serverp. 46
Backdoor Connection Methodsp. 47
Initiating a Direct Connection to the Backdoorp. 47
Benefit of this Methodp. 48
Drawbacks to this Methodp. 48
Initiating a Connection from the Backdoorp. 49
Benefits of this Connection Methodp. 50
Drawback to this Methodp. 50
Backdoor Execution Methodsp. 50
Executing the Backdoor using a Registry Entryp. 50
Benefits of this Methodp. 52
Drawback to this Methodp. 52
Executing the Backdoor using a Windows Servicep. 52
Benefits of this Methodp. 54
Drawback to this Methodp. 54
Executing the Backdoor using Windows Task Schedulerp. 54
Benefit to this Methodp. 56
Backdoor Execution Summaryp. 56
Summaryp. 57
Solutions Fast Trackp. 57
Frequently Asked Questionsp. 59
Enumeration and Scanning with Netcat and Nmapp. 61
Introductionp. 62
Objectivesp. 62
Before You Startp. 62
Why Do This?p. 63
Approachp. 64
Scanningp. 64
Enumerationp. 65
Notes and Documentationp. 66
Active versus Passivep. 67
Moving Onp. 67
Core Technologyp. 67
How Scanning Worksp. 67
Port Scanningp. 68
Going behind the Scenes with Enumerationp. 71
Service Identificationp. 71
RPC Enumerationp. 72
Fingerprintingp. 72
Being Loud, Quiet, and All That Lies Betweenp. 73
Timingp. 73
Bandwidth Issuesp. 74
Unusual Packet Formationp. 74
Open Source Toolsp. 74
Scanningp. 75
Nmapp. 75
Nmap: Ping Sweepp. 75
Nmap: ICMP Optionsp. 76
Nmap: Output Optionsp. 77
Nmap: Stealth Scanningp. 77
Nmap: OS Fingerprintingp. 78
Nmap: Scriptingp. 79
Nmap: Speed Optionsp. 80
Netenum: Ping Sweepp. 83
Unicornscan: Port Scan and Fuzzingp. 83
Scanrand: Port Scanp. 84
Enumerationp. 85
Nmap: Banner Grabbingp. 85
Netcatp. 87
P0f: Passive OS Fingerprintingp. 88
Xprobe2: OS Fingerprintingp. 88
Httprintp. 89
Ike-scan: VPN Assessmentp. 91
Amap: Application Version Detectionp. 92
Windows Enumeration: Smbgetserverinfo/smbdumpusers/smbclientp. 92
Banner Grabbing with Netcatp. 97
Introductionp. 98
Benefits of Banner Grabbingp. 98
Benefits for the Server Ownerp. 99
Finding Unauthorized Serversp. 99
Benefits for a Network Attackerp. 101
Why Not Nmap?p. 103
Basic Banner Grabbingp. 104
Web Servers (HTTP)p. 104
Acquiring Just the Headerp. 106
Dealing With Obfuscated Bannersp. 107
Apache ServerTokensp. 109
Reading the Subtle Clues in an Obfuscated Headerp. 110
HTTP 1.0 vs. HTTP 1.1p. 110
Secure HTTP servers (HTTPs)p. 112
File Transfer Protocol (FTP) Serversp. 116
Immense FTP Payloadsp. 118
E-mail Serversp. 120
Post Office Protocol (POP) Serversp. 120
Simple Mail Transport Protocol (SMTP) Serversp. 121
So, Back to the Banner Grabbingp. 122
Fingerprinting SMTP Server Responsesp. 124
How to Modify your E-mail Bannersp. 125
Sendmail Bannersp. 126
Microsoft Exchange SMTP Bannersp. 128
Microsoft Exchange POP and IMAP Bannersp. 129
Secure Shell (SSH) Serversp. 130
Hiding the SSH Bannerp. 132
Banner Grabbing with a Packet Snifferp. 132
Summaryp. 137
Solutions Fast Trackp. 139
Frequently Asked Questionsp. 141
The Dark Side of Netcatp. 143
Introductionp. 144
Sniffing Traffic within a Systemp. 145
Sniffing Traffic by Relocating a Servicep. 146
Sniffing Traffic without Relocating a Servicep. 151
Rogue Tunnel Attacksp. 156
Connecting Through a Pivot Systemp. 160
Transferring Filesp. 165
Using Secure Shellp. 165
Using Redirectionp. 166
Man-in-the-middle Attacksp. 167
Backdoors and Shell Shovelingp. 168
Backdoorsp. 168
Shell Shovelingp. 170
Shoveling with No Direct Connection to Targetp. 170
Shoveling with Direct Connection to Targetp. 173
Netcat on Windowsp. 174
Summaryp. 176
Transferring Files Using Netcatp. 179
Introductionp. 180
When to Use Netcat to Transfer Filesp. 180
Sometimes Less Really is Lessp. 181
Security Concernsp. 181
Software Installation on Windows Clientsp. 182
Where Netcat Shinesp. 182
Speed of Deploymentp. 183
Stealthp. 183
Small Footprintp. 184
Simple Operationp. 184
Performing Basic File Transfersp. 185
Transferring Files with the Original Netcatp. 185
Closing Netcat When the Transfer is Completedp. 186
Other Options and Considerationsp. 187
Timing Transfers, Throughput, etc.p. 188
Tunneling a Transfer Through an Intermediaryp. 189
Using Netcat Variantsp. 190
Cryptcatp. 190
GNU Netcatp. 192
SBDp. 193
Socatp. 194
Socat Basicsp. 194
Transferring Files with Socatp. 195
Encryptionp. 196
Mixing and Matchingp. 197
Ensuring File Confidentialityp. 198
Using OpenSSHp. 198
Installing and Configuring Secure Shellp. 199
Configuring OpenSSH Port Forwardingp. 201
Using SSLp. 202
Configuring Stunnelp. 202
Using IPsecp. 205
Configuring IPSec on Windowsp. 206
Configuring IPSec on Linuxp. 212
Ensuring File Integrityp. 217
Hashing Toolsp. 217
Using Netcat for Testingp. 219
Testing Bandwidthp. 219
Testing Connectivityp. 220
Summaryp. 221
Solutions Fast Trackp. 221
Frequently Asked Questionsp. 223
Troubleshooting with Netcatp. 225
Introductionp. 226
Scanning a Systemp. 227
Testing Network Latencyp. 230
Using Netcat as a Listener on Our Target Systemp. 231
Using a Pre-existing Service on Our Target Systemp. 234
Using a UDP Servicep. 234
Using a TCP Servicep. 235
Application Connectivityp. 236
Troubleshooting HTTPp. 237
Troubleshooting FTPp. 243
Troubleshooting Active FTP Transfers Using Netcatp. 245
Troubleshooting Passive FTP Transfers using Netcatp. 248
Summaryp. 251
Indexp. 253
Table of Contents provided by Ingram. All Rights Reserved.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.