Tuesday, February 7, 2012

BACKDOORING USING NetCat part1

Day 5

Netcat is a computer networking service for reading from and writing network connections using TCP or UDP Netcat is designed to be a dependable “back-end” device that can be used directly or easily driven by other programs and scripts. Netcat is often referred to as a "Swiss-army knife for TCP/IP." Its list of features includes port scanning, transferring files, and port listening, and it can be used as a backdoor. (wikipedia)

Tools :
  • nc traditional
  • Virtualbox (victim)
Ip Address:
  • Attacker 192.168.56.1 Backtrack 5 R1
  • Victim 192.168.56.101 Ubuntu
Im a newbie not expert and my english is not fluently but I always try, in this session I learn and try how to make backdoor with nc. Because my nc isnt traditional I must transfer nc.traditional to victim. By using service protocol apache and http. Copy file nc.traditional to directory /var/www
transfer nc.traditional
Ubuntu (Victim) open browser by type Ip Address from attacker and save this file.
Download nc.traditional
Victim : Go to directory file where the nc.traditional saved, and than running the nc

 
running nc.traditional
 Attacker running nc too, this is already running
attacker listening nc.traditional
by cecking id you can known the nc is succes by see th prosess using netstat, ps -aux or by type the ls.

Attacker intrussion Victim
By ls I know what is the list of directory home in the victim, and next I will transfer cymothoa to the victim

Succes Transfer
 File input as like as file output.

0 comments:

Post a Comment