Netcat power tools:
Originally released in 1996, Netcat is a netowrking program designed to read and write data across both Transmission Control Protocol TCP and User Datagram Protocol (UDP) connections using the TCP/Internet Protocol (IP) protocol suite. Netcat is often referred to as a "Swiss Army knife" ut...
Gespeichert in:
Weitere beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Burlington, MA
Syngress Pub.
2008
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781597492577/?ar |
Zusammenfassung: | Originally released in 1996, Netcat is a netowrking program designed to read and write data across both Transmission Control Protocol TCP and User Datagram Protocol (UDP) connections using the TCP/Internet Protocol (IP) protocol suite. Netcat is often referred to as a "Swiss Army knife" utility, and for good reason. Just like the multi-function usefullness of the venerable Swiss Army pocket knife, Netcat's functionality is helpful as both a standalone program and a backe-end tool in a wide range of applications. Some of the many uses of Netcat include port scanning, transferring files, grabbing banners, port listening and redirection, and more nefariously, a backdoor. This is the only book dedicated to comprehensive coverage of the tool's many features, and by the end of this book, you'll discover how Netcat can be one of the most valuable tools in your arsenal. * Get Up and Running with Netcat Simple yet powerful ... Don't let the trouble-free installation and the easy command line belie the fact that Netcat is indeed a potent and powerful program. * Go PenTesting with Netcat Master Netcat's port scanning and service identification capabilities as well as obtaining Web server application information. Test and verify outbound firewall rules and avoid detection by using antivirus software and the Window Firewall. Also, create a backdoor using Netcat. * Conduct Enumeration and Scanning with Netcat, Nmap, and More! Netcat's not the only game in town ... Learn the process of network of enumeration and scanning, and see how Netcat along with other tools such as Nmap and Scanrand can be used to thoroughly identify all of the assets on your network. * Banner Grabbing with Netcat Banner grabbing is a simple yet highly effective method of gathering information about a remote target, and can be performed with relative ease with the Netcat utility. * Explore the Dark Side of Netcat See the various ways Netcat has been used to provide malicious, unauthorized access to their targets. By walking through these methods used to set up backdoor access and circumvent protection mechanisms through the use of Netcat, we can understand how malicious hackers obtain and maintain illegal access. Embrace the dark side of Netcat, so that you may do good deeds later. * Transfer Files Using Netcat The flexability and simple operation allows Netcat to fill a niche when it comes to moving a file or files in a quick and easy fashion. Encryption is provided via several different avenues including integrated support on some of the more modern Netcat variants, tunneling via third-party tools, or operating system integrated IPsec policies. * Troubleshoot Your Network with Netcat Examine remote systems using Netat's scanning ability. Test open ports to see if they really are active and see what protocls are on those ports. Communicate with different applications to determine what problems might exist, and gain insight into how to solve these problems. * Sniff Traffic within a System Use Netcat as a sniffer within a system to collect incoming and outgoing data. Set up Netcat to listen at ports higher than 1023 (the well-known ports), so you can use Netcat even as a normal user. * Comprehensive introduction to the #4 most popular open source security tool available * Tips and tricks on the legitimate uses of Netcat * Detailed information on its nefarious purposes * Demystifies security issues surrounding Netcat * Case studies featuring dozens of ways to use Netcat in daily tasks Netcat in one of the most commonly used anti-hacking tools in the world. It reads and writes data across network connections, using the TCP/IP protocol. It is designed to be a reliable "back-end" tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging tool, since it can create almost any kind of connection you would need and has very interesting built-in capabilities. It lends itself to being useful in a myriad of situations. This book offers a comprehensive look at its possibilities |
Beschreibung: | Includes index. - Includes bibliographical references and index. - Print version record |
Umfang: | 1 Online-Ressource (260 Seiten) illustrations |
ISBN: | 9781597492577 1597492574 9780080558738 0080558739 1281716863 9781281716866 9786611716868 6611716866 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047647531 | ||
003 | DE-627-1 | ||
005 | 20240228114315.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2008 xx |||||o 00| ||eng c | ||
020 | |a 9781597492577 |9 978-1-59749-257-7 | ||
020 | |a 1597492574 |9 1-59749-257-4 | ||
020 | |a 9780080558738 |c electronic bk. |9 978-0-08-055873-8 | ||
020 | |a 0080558739 |c electronic bk. |9 0-08-055873-9 | ||
020 | |a 1281716863 |9 1-281-71686-3 | ||
020 | |a 9781281716866 |9 978-1-281-71686-6 | ||
020 | |a 9786611716868 |9 9786611716868 | ||
020 | |a 6611716866 |9 6611716866 | ||
035 | |a (DE-627-1)047647531 | ||
035 | |a (DE-599)KEP047647531 | ||
035 | |a (ORHE)9781597492577 | ||
035 | |a (DE-627-1)047647531 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a UTN |2 bicssc | |
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a Netcat power tools |c Jan Kanclirz Jr., technical editor ; Brian Baskin [and others] |
264 | 1 | |a Burlington, MA |b Syngress Pub. |c 2008 | |
300 | |a 1 Online-Ressource (260 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index. - Includes bibliographical references and index. - Print version record | ||
520 | |a Originally released in 1996, Netcat is a netowrking program designed to read and write data across both Transmission Control Protocol TCP and User Datagram Protocol (UDP) connections using the TCP/Internet Protocol (IP) protocol suite. Netcat is often referred to as a "Swiss Army knife" utility, and for good reason. Just like the multi-function usefullness of the venerable Swiss Army pocket knife, Netcat's functionality is helpful as both a standalone program and a backe-end tool in a wide range of applications. Some of the many uses of Netcat include port scanning, transferring files, grabbing banners, port listening and redirection, and more nefariously, a backdoor. This is the only book dedicated to comprehensive coverage of the tool's many features, and by the end of this book, you'll discover how Netcat can be one of the most valuable tools in your arsenal. * Get Up and Running with Netcat Simple yet powerful ... Don't let the trouble-free installation and the easy command line belie the fact that Netcat is indeed a potent and powerful program. * Go PenTesting with Netcat Master Netcat's port scanning and service identification capabilities as well as obtaining Web server application information. Test and verify outbound firewall rules and avoid detection by using antivirus software and the Window Firewall. Also, create a backdoor using Netcat. * Conduct Enumeration and Scanning with Netcat, Nmap, and More! Netcat's not the only game in town ... Learn the process of network of enumeration and scanning, and see how Netcat along with other tools such as Nmap and Scanrand can be used to thoroughly identify all of the assets on your network. * Banner Grabbing with Netcat Banner grabbing is a simple yet highly effective method of gathering information about a remote target, and can be performed with relative ease with the Netcat utility. * Explore the Dark Side of Netcat See the various ways Netcat has been used to provide malicious, unauthorized access to their targets. By walking through these methods used to set up backdoor access and circumvent protection mechanisms through the use of Netcat, we can understand how malicious hackers obtain and maintain illegal access. Embrace the dark side of Netcat, so that you may do good deeds later. * Transfer Files Using Netcat The flexability and simple operation allows Netcat to fill a niche when it comes to moving a file or files in a quick and easy fashion. Encryption is provided via several different avenues including integrated support on some of the more modern Netcat variants, tunneling via third-party tools, or operating system integrated IPsec policies. * Troubleshoot Your Network with Netcat Examine remote systems using Netat's scanning ability. Test open ports to see if they really are active and see what protocls are on those ports. Communicate with different applications to determine what problems might exist, and gain insight into how to solve these problems. * Sniff Traffic within a System Use Netcat as a sniffer within a system to collect incoming and outgoing data. Set up Netcat to listen at ports higher than 1023 (the well-known ports), so you can use Netcat even as a normal user. * Comprehensive introduction to the #4 most popular open source security tool available * Tips and tricks on the legitimate uses of Netcat * Detailed information on its nefarious purposes * Demystifies security issues surrounding Netcat * Case studies featuring dozens of ways to use Netcat in daily tasks | ||
520 | |a Netcat in one of the most commonly used anti-hacking tools in the world. It reads and writes data across network connections, using the TCP/IP protocol. It is designed to be a reliable "back-end" tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging tool, since it can create almost any kind of connection you would need and has very interesting built-in capabilities. It lends itself to being useful in a myriad of situations. This book offers a comprehensive look at its possibilities | ||
546 | |a English. | ||
650 | 0 | |a Data protection | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a TCP/IP (Computer network protocol) | |
650 | 0 | |a Computer networks | |
650 | 2 | |a Computer Communication Networks | |
650 | 4 | |a Netcat | |
650 | 4 | |a Réseaux d'ordinateurs | |
650 | 4 | |a Protection de l'information (Informatique) | |
650 | 4 | |a TCP/IP (Protocole de réseaux d'ordinateurs) | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a COMPUTERS ; Internet ; Security | |
650 | 4 | |a COMPUTERS ; Networking ; Security | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Computer networks | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Data protection | |
650 | 4 | |a TCP/IP (Computer network protocol) | |
700 | 1 | |a Kanclirz, Jan |e MitwirkendeR |4 ctb | |
700 | 1 | |a Baskin, Brian |e MitwirkendeR |4 ctb | |
776 | 1 | |z 1597492574 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1597492574 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781597492577/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047647531 |
---|---|
_version_ | 1821494867537166336 |
adam_text | |
any_adam_object | |
author2 | Kanclirz, Jan Baskin, Brian |
author2_role | ctb ctb |
author2_variant | j k jk b b bb |
author_facet | Kanclirz, Jan Baskin, Brian |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047647531 (DE-599)KEP047647531 (ORHE)9781597492577 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06652cam a22007332 4500</leader><controlfield tag="001">ZDB-30-ORH-047647531</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114315.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2008 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597492577</subfield><subfield code="9">978-1-59749-257-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597492574</subfield><subfield code="9">1-59749-257-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080558738</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-055873-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080558739</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-055873-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281716863</subfield><subfield code="9">1-281-71686-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281716866</subfield><subfield code="9">978-1-281-71686-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611716868</subfield><subfield code="9">9786611716868</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6611716866</subfield><subfield code="9">6611716866</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047647531</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047647531</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781597492577</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047647531</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UTN</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Netcat power tools</subfield><subfield code="c">Jan Kanclirz Jr., technical editor ; Brian Baskin [and others]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, MA</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (260 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Originally released in 1996, Netcat is a netowrking program designed to read and write data across both Transmission Control Protocol TCP and User Datagram Protocol (UDP) connections using the TCP/Internet Protocol (IP) protocol suite. Netcat is often referred to as a "Swiss Army knife" utility, and for good reason. Just like the multi-function usefullness of the venerable Swiss Army pocket knife, Netcat's functionality is helpful as both a standalone program and a backe-end tool in a wide range of applications. Some of the many uses of Netcat include port scanning, transferring files, grabbing banners, port listening and redirection, and more nefariously, a backdoor. This is the only book dedicated to comprehensive coverage of the tool's many features, and by the end of this book, you'll discover how Netcat can be one of the most valuable tools in your arsenal. * Get Up and Running with Netcat Simple yet powerful ... Don't let the trouble-free installation and the easy command line belie the fact that Netcat is indeed a potent and powerful program. * Go PenTesting with Netcat Master Netcat's port scanning and service identification capabilities as well as obtaining Web server application information. Test and verify outbound firewall rules and avoid detection by using antivirus software and the Window Firewall. Also, create a backdoor using Netcat. * Conduct Enumeration and Scanning with Netcat, Nmap, and More! Netcat's not the only game in town ... Learn the process of network of enumeration and scanning, and see how Netcat along with other tools such as Nmap and Scanrand can be used to thoroughly identify all of the assets on your network. * Banner Grabbing with Netcat Banner grabbing is a simple yet highly effective method of gathering information about a remote target, and can be performed with relative ease with the Netcat utility. * Explore the Dark Side of Netcat See the various ways Netcat has been used to provide malicious, unauthorized access to their targets. By walking through these methods used to set up backdoor access and circumvent protection mechanisms through the use of Netcat, we can understand how malicious hackers obtain and maintain illegal access. Embrace the dark side of Netcat, so that you may do good deeds later. * Transfer Files Using Netcat The flexability and simple operation allows Netcat to fill a niche when it comes to moving a file or files in a quick and easy fashion. Encryption is provided via several different avenues including integrated support on some of the more modern Netcat variants, tunneling via third-party tools, or operating system integrated IPsec policies. * Troubleshoot Your Network with Netcat Examine remote systems using Netat's scanning ability. Test open ports to see if they really are active and see what protocls are on those ports. Communicate with different applications to determine what problems might exist, and gain insight into how to solve these problems. * Sniff Traffic within a System Use Netcat as a sniffer within a system to collect incoming and outgoing data. Set up Netcat to listen at ports higher than 1023 (the well-known ports), so you can use Netcat even as a normal user. * Comprehensive introduction to the #4 most popular open source security tool available * Tips and tricks on the legitimate uses of Netcat * Detailed information on its nefarious purposes * Demystifies security issues surrounding Netcat * Case studies featuring dozens of ways to use Netcat in daily tasks</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Netcat in one of the most commonly used anti-hacking tools in the world. It reads and writes data across network connections, using the TCP/IP protocol. It is designed to be a reliable "back-end" tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging tool, since it can create almost any kind of connection you would need and has very interesting built-in capabilities. It lends itself to being useful in a myriad of situations. This book offers a comprehensive look at its possibilities</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">TCP/IP (Computer network protocol)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Netcat</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">TCP/IP (Protocole de réseaux d'ordinateurs)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Internet ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">TCP/IP (Computer network protocol)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kanclirz, Jan</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Baskin, Brian</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1597492574</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1597492574</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781597492577/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047647531 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:12Z |
institution | BVB |
isbn | 9781597492577 1597492574 9780080558738 0080558739 1281716863 9781281716866 9786611716868 6611716866 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (260 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Netcat power tools Jan Kanclirz Jr., technical editor ; Brian Baskin [and others] Burlington, MA Syngress Pub. 2008 1 Online-Ressource (260 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index. - Includes bibliographical references and index. - Print version record Originally released in 1996, Netcat is a netowrking program designed to read and write data across both Transmission Control Protocol TCP and User Datagram Protocol (UDP) connections using the TCP/Internet Protocol (IP) protocol suite. Netcat is often referred to as a "Swiss Army knife" utility, and for good reason. Just like the multi-function usefullness of the venerable Swiss Army pocket knife, Netcat's functionality is helpful as both a standalone program and a backe-end tool in a wide range of applications. Some of the many uses of Netcat include port scanning, transferring files, grabbing banners, port listening and redirection, and more nefariously, a backdoor. This is the only book dedicated to comprehensive coverage of the tool's many features, and by the end of this book, you'll discover how Netcat can be one of the most valuable tools in your arsenal. * Get Up and Running with Netcat Simple yet powerful ... Don't let the trouble-free installation and the easy command line belie the fact that Netcat is indeed a potent and powerful program. * Go PenTesting with Netcat Master Netcat's port scanning and service identification capabilities as well as obtaining Web server application information. Test and verify outbound firewall rules and avoid detection by using antivirus software and the Window Firewall. Also, create a backdoor using Netcat. * Conduct Enumeration and Scanning with Netcat, Nmap, and More! Netcat's not the only game in town ... Learn the process of network of enumeration and scanning, and see how Netcat along with other tools such as Nmap and Scanrand can be used to thoroughly identify all of the assets on your network. * Banner Grabbing with Netcat Banner grabbing is a simple yet highly effective method of gathering information about a remote target, and can be performed with relative ease with the Netcat utility. * Explore the Dark Side of Netcat See the various ways Netcat has been used to provide malicious, unauthorized access to their targets. By walking through these methods used to set up backdoor access and circumvent protection mechanisms through the use of Netcat, we can understand how malicious hackers obtain and maintain illegal access. Embrace the dark side of Netcat, so that you may do good deeds later. * Transfer Files Using Netcat The flexability and simple operation allows Netcat to fill a niche when it comes to moving a file or files in a quick and easy fashion. Encryption is provided via several different avenues including integrated support on some of the more modern Netcat variants, tunneling via third-party tools, or operating system integrated IPsec policies. * Troubleshoot Your Network with Netcat Examine remote systems using Netat's scanning ability. Test open ports to see if they really are active and see what protocls are on those ports. Communicate with different applications to determine what problems might exist, and gain insight into how to solve these problems. * Sniff Traffic within a System Use Netcat as a sniffer within a system to collect incoming and outgoing data. Set up Netcat to listen at ports higher than 1023 (the well-known ports), so you can use Netcat even as a normal user. * Comprehensive introduction to the #4 most popular open source security tool available * Tips and tricks on the legitimate uses of Netcat * Detailed information on its nefarious purposes * Demystifies security issues surrounding Netcat * Case studies featuring dozens of ways to use Netcat in daily tasks Netcat in one of the most commonly used anti-hacking tools in the world. It reads and writes data across network connections, using the TCP/IP protocol. It is designed to be a reliable "back-end" tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging tool, since it can create almost any kind of connection you would need and has very interesting built-in capabilities. It lends itself to being useful in a myriad of situations. This book offers a comprehensive look at its possibilities English. Data protection Computer networks Security measures TCP/IP (Computer network protocol) Computer networks Computer Communication Networks Netcat Réseaux d'ordinateurs Protection de l'information (Informatique) TCP/IP (Protocole de réseaux d'ordinateurs) Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures Kanclirz, Jan MitwirkendeR ctb Baskin, Brian MitwirkendeR ctb 1597492574 Erscheint auch als Druck-Ausgabe 1597492574 |
spellingShingle | Netcat power tools Data protection Computer networks Security measures TCP/IP (Computer network protocol) Computer networks Computer Communication Networks Netcat Réseaux d'ordinateurs Protection de l'information (Informatique) TCP/IP (Protocole de réseaux d'ordinateurs) Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures |
title | Netcat power tools |
title_auth | Netcat power tools |
title_exact_search | Netcat power tools |
title_full | Netcat power tools Jan Kanclirz Jr., technical editor ; Brian Baskin [and others] |
title_fullStr | Netcat power tools Jan Kanclirz Jr., technical editor ; Brian Baskin [and others] |
title_full_unstemmed | Netcat power tools Jan Kanclirz Jr., technical editor ; Brian Baskin [and others] |
title_short | Netcat power tools |
title_sort | netcat power tools |
topic | Data protection Computer networks Security measures TCP/IP (Computer network protocol) Computer networks Computer Communication Networks Netcat Réseaux d'ordinateurs Protection de l'information (Informatique) TCP/IP (Protocole de réseaux d'ordinateurs) Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures |
topic_facet | Data protection Computer networks Security measures TCP/IP (Computer network protocol) Computer networks Computer Communication Networks Netcat Réseaux d'ordinateurs Protection de l'information (Informatique) TCP/IP (Protocole de réseaux d'ordinateurs) Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures |
work_keys_str_mv | AT kanclirzjan netcatpowertools AT baskinbrian netcatpowertools |