Use the -Âœs flag to spoof the source IP address:
nc -s spoofed_ip remote_host port
This command will cause the remote host to respond back to the
spoofed IP address. The -Âœs flag can be used along with most of
the commands presented in this table.
Transfer a file
On the server host:
nc -v -l -p <port> < <file>
On the client host:
nc -v <server_host> <port> > <file>
nc -v -l -p <port> > file
nc -Âœv <client_host> <port> < file>
These can all be used by your netcat
Once your in a Computer or server, you can exploit anything you want, usually i use vbs and .bat files, but I also want to create files through this method, now, you can transfer files by using the commands previously stated, but I like to create the files on the fly. You can google ways to transfer files through MS-DOS, and get many methods. I always like to use the Echo method
Echo put file contents here > name.any file type
This will create the file specified in the current directory
Once your in you can run these by the simple command line
Step 4: Netcat
There are many other things you can do with netcat, but I have not gone into them in this guide.
Please do not use Back Doors on computers you don’t won, or where you have no permission.