Home IT Linux Windows Database Network Programming Server Mobile  
  Home \ Linux \ Linux common network tools: batch scanning of hosting services netcat     - Mac OS X systems create Ubuntu USB boot disk for the Mac (Linux)

- Oracle: RETURNING clause (Database)

- Copy U disk files to the Linux system on a virtual machine (Linux)

- installation process of Matlab 2012a under Ubuntu 14.04 (Linux)

- Three kinds of binary tree traversal recursive and iterative solution (Programming)

- Use regular expressions to check whether the input box to enter a URL (Programming)

- MySQL binlog group to submit XA (two-phase commit) (Database)

- SELinux security permissions HTTP + PHP service changes (Server)

- Windows 7 hard disk to install Ubuntu 15.04 (Linux)

- Linux cd command Detailed (Linux)

- Installation Atom text editor on Mint Ubuntu / Linux (Linux)

- JDK tools jstat (Linux)

- What happens after the MySQL disk space is full (Database)

- Linux Getting Started Tutorial: / var / spool / clientmqueue fill the root directory (Linux)

- Easy to install CentOS 6.6 desktop environment (Linux)

- Linux System Getting Started Learning: hard disk partition, and to deal with traps (Linux)

- LVM basic concepts, management (Linux)

- The Java Properties class action (Programming)

- Use Makeself Create installation file (Linux)

- Use JMS listener Oracle AQ, trigger the execution of Java programs in the database changes (Database)

  Linux common network tools: batch scanning of hosting services netcat
  Add Date : 2018-11-21      
  Netcat also known as Swiss Army knife, hackers and system administrators commonly used network tools, originally developed purpose file transfer, and later developed a lot of powerful features, such as hosting services can be done batch scanning.

Before the introduction of another, more commonly used bulk hosting service scan tool: nmap.

netcat installation is very simple, direct yum install:

yum install nc

Is generally not recommended in a production environment installation nc, nc because in addition to batch scanning hosting service, it also supports proxy port, file transfer, likely to cause safety problems.

Batch Scanning netcat of hosting services

-------------------------------------------------- ------------------------------

netcat when scanning commonly used parameters:

-w timeout settings

-z O mode

-v show command execution

Commonly used commands:

TCP protocol

nc -v -z -w2 1-50

UDP protocol

nc -v -z -w2 -u 1-50

netcat the file transfer

-------------------------------------------------- ------------------------------

netcat can specify a local port number to open listening mode, the client can use the same netcat port to send information to open a connection, the information will be displayed on the service side.

Open listening

nc -l 2389

establish connection

nc localhost 2389

If the output is redirected to the service side of the document, it can be used for file transfer:

nc -l 2389> test

Transfer files

cat testfile | nc localhost 2389

If the test on a single server, you can use the & nc switch to the background task in order to run the client.
- Ora-00600 [fast hot Atkins soft _ that _ Oh, of course not _less_ profile] (Database)
- Java Set and List in the relationship and difference (Programming)
- CentOS6.x and Windows XP and Windows Server 2003 Open IPv6 related matters (Linux)
- SecureCRT use the configuration detailed tutorial (Linux)
- Linux Mint 17 set up the Ruby environment (Linux)
- Fragment Android developers learning to resolve (Programming)
- Oracle 12C RAC on temporary table space Enlighten (Database)
- Use NTFS-3G to mount NTFS partitions under Linux U disk and removable hard disk (Linux)
- SQLite database commonly used sentences and visualization tools on MAC MeasSQLlite use (Database)
- Solaris 10 nagios monitoring system (Linux)
- Linux beginners to develop the seven habits (Linux)
- How LUKS encrypted disk / partition to perform remote incremental backup (Linux)
- CentOS7 iptables (Linux)
- RMAN backup file is much larger than the size of the database Cause Analysis (Database)
- Observation network performance tools for Linux (Linux)
- UNIX how to restrict users by IP Telnet (Linux)
- Linux kernel programming parameter passing between modules and function calls (Programming)
- Oracle ordinary users show parameter method (Database)
- Arrow keys, backspace key garbled in Python-2.7.5 Interactive Mode under CentOS 5.8 (Linux)
- Linux non-root user uses less than 1024 ports (Linux)
  CopyRight 2002-2016 newfreesoft.com, All Rights Reserved.