博主都十多天没看见了,赶紧找 | 共分享了个网络安全资讯

NC反弹

  • 内容
  • 相关

用法:


NetCat for Windows v1.14.89 https://github.com/diegocr/netcat
connect to somewhere:   nc [-options] hostname port[s] [ports] ...
listen for inbound:     nc -l -p port [options] [hostname] [port]
options:
        -d              detach from console, background mode
        -g gateway      source-routing hop point[s], up to 8
        -G num          source-routing pointer: 4, 8, 12, ...
        -h              this cruft
        -i secs         delay interval for lines sent, ports scanned
        -l              listen mode, for inbound connects
        -L              listen harder, re-listen on socket close
        -n              numeric-only IP addresses, no DNS
        -o file         hex dump of traffic
        -p port         local port number
        -r              randomize local and remote ports
        -s addr         local source address
        -t              answer TELNET negotiation
        -u              UDP mode
        -v              verbose [use twice to be more verbose]
        -w secs         timeout for connects and final net reads
        -x              handle ansi escape codes
        -z              zero-I/O mode [used for scanning]
port numbers can be individual or ranges: m-n [inclusive]

命令执行:



nc -l -v 反弹端口


猫先生已经设置回复可下载

本文标签:

收录状态:百度√[百度已收录]丨360√[360已收录]丨搜狗√[搜狗已收录]

版权声明:若无特殊注明,本文皆为《Mrcat》原创,转载请保留文章出处。

本文链接:NC反弹 - https://mracat.com/218.html

用手机扫描访问本文章

发表评论

电子邮件地址不会被公开。 必填项已用*标注

请勿乱用他人邮箱,否者您将收不到最新动态消息~