This is Netcat tutorial Part 3, and Last part *))*. Here I am gonna explain back door with Netcat =).. So let's get started...Detailed tutorial on NetCat
Back Door
By the way guys, you can even listen to NetBios ports that are probably
running on most NT machines.
This way you can get a connection to a
machine that may have port filtering enabled in the TCP/IP Security Network
control panel.
Unlike Unix, NT does not seem to have any security around
which ports that user programs are allowed to bind to.
This means any
user can run a program that will bind to the NETBIOS ports.
You will need to bind "in front of" some services that may already be
listening on those ports.
An example is the NETBIOS Session Service that
is running on port 139 of NT machines that are sharing files.
You need
to bind to a specific source address (one of the IP addresses of the
machine) to accomplish this.
This gives Netcat priority over the NETBIOS
service which is at a lower priority because it is bound to ANY IP address.
This is done with the Netcat -s option:
Back door on windows
Thank's for reading, hope it was enough to understand Netcat.
// CrosS 0_
People use NetCat only for Reverse Shell, Lulz
Anyhow See y0 next time =)