Recent Posts

  • Samba Server Exploitation January 17, 2018
  • GDB Tutorial January 16, 2018
  • Hacking Samba on Ubuntu and Installing the Meterpreter January 16, 2018
Prepare for Offensive Security Certified Professional
pentester@tonyng.net  
    Menu
    • Article
    • Industry News for IT Security
    • OSCP
      • OSCP Official Complete Guide
      • OSCP Exp. Sharing
    • Wifi Hacking
    • Online Resources
    • Lab
    • Must Try
    • Vulnerability Database
    • Skills
      • Buffer Overflow
      • Privilege Escalation
      • Null Session
      • SSH

    sectools.org

    Home / Tag: sectools.org
    Using Netcat To Spawn A Remote Shell
    09 Jan

    Using Netcat To Spawn A Remote Shell

    • Pentester
    • Netcat,Skills
    • Tags: sectools.org, spawning remote shell
    • no comments

    Introduction Netcat is one of those old school hacking tools that has been around for what seems like an eternity. Its stable release was made available back in March 20, 1996 and is currently available for download at http://netcat.sourceforge.net. That being said…I didn’t even get my first real computer until 1999, which was a Compaq Presario. […]

    read more »

    Site Categories

    • Article (15)
    • Backdoor (1)
    • Buffer Overflow (16)
    • Case Studies (2)
    • Cheat Sheet (6)
    • ColdFusion (6)
    • Lab (6)
    • Metasploit (7)
    • Must Try (2)
    • Netcat (1)
    • Null Session (5)
    • Online Resources (2)
    • OS Fingerprinting (1)
    • OSCP Exp. Sharing (8)
    • Payloads (4)
    • Privilege Escalation (14)
    • RFI and LFI (2)
    • Samba / SMB (3)
    • Skills (63)
    • SQL Injection (4)
    • SSH (5)
    • Uncategorized (2)
    • Vulnerability Database (5)
    • Wifi Hacking (2)

    Tag Cloud

    445 airodump-ng APSB09-09 authentication bypass Buffer Overflow burp bypassuac cfm shell C functions vulnerable data breach fckeditor getsystem getuid google kali kali wifi hack Linux Privilege Escalation memory corruption memory layout metasploit Meterpreter meterpreter command mitm MS08_067 ms11-080 msfvenom null session oscp oscp exp sharing Privilege Escalation ps psexec pyinstaller pywin32 rpcclient shellcode smb stack steal_token systeminfo UAC bypass union injections wifi hacking wifiphisher wmic
    Copyright © 2017 pentest.tonyng.net. All rights reserved.
      Scroll