Results 1 to 4 of 4

Thread: what is /pentest/windows-binaries/tools/nc.txt ???

Hybrid View

  1. #1
    Just burned his ISO
    Join Date
    Feb 2006
    Posts
    7

    Default what is /pentest/windows-binaries/tools/nc.txt ???

    My guess is that this is some sort of way to hide a netcat executable from AV by packing or obfuscating the internals of the recompiled hex of the program. I have searched the forum and google and still have no idea. Can someone give a clue to a noob?

  2. #2
    Member imported_vvpalin's Avatar
    Join Date
    Apr 2009
    Posts
    442

    Default

    no its so if you have a shell you can just paste the text into the window and load up nc that way you dont need to grab it from a ftp
    Using backtrack for the first time is like being 10 years old again with the keys to a Ferrari.

  3. #3
    Just burned his ISO
    Join Date
    Feb 2006
    Posts
    7

    Default

    So... while in that shell, netcat just remains in memory? Do most AV's pick up on this?
    thanks again...wait.. i see... it just echos the file to nc.exe where ever your shell is located in the directory structure...i guess..

  4. #4
    Member imported_vvpalin's Avatar
    Join Date
    Apr 2009
    Posts
    442

    Default

    When you gain a remote shell it is non interactive meaning it can be hard to download things. This is an easy way to get an awesome and usefull tool onto the system, if you want to bypass the AV you will either need to use something else or obfuscate the code as i doubt its going to pass.
    Using backtrack for the first time is like being 10 years old again with the keys to a Ferrari.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •