Spoof source IP address

Spoof source IP address

Use the -Γ‚Ε“s flag to spoof the source IP address:
nc -s spoofed_ip remote_host port
This command will cause the remote host to respond back to the
spoofed IP address. The -Γ‚Ε“s flag can be used along with most of
the commands presented in this table.

Transfer a file

On the server host:
nc -v -l -p <port> < <file>


On the client host:
nc -v <server_host> <port> > <file>
It is also possible for the client host to listen on a port in order to receive a file. To do this, run the following command on the client host:
nc -v -l -p <port> > file
And run the following command on the server host:
nc -Γ‚Ε“v <client_host> <port> < file>

These can all be used by your netcat


Step 3: The Bat File portion
Once your in a Computer or server, you can exploit anything you want, usually i use vbs and .bat files, but I also want to create files through this method, now, you can transfer files by using the commands previously stated, but I like to create the files on the fly. You can google ways to transfer files through MS-DOS, and get many methods. I always like to use the Echo method
once your in, use this command

Echo put file contents here > name.any file type

This will create the file specified in the current directory

Once your in you can run these by the simple command line
start filename

Step 4: Netcat

There are many other things you can do with netcat, but I have not gone into them in this guide.
Please do not use Back Doors on computers you don’t won, or where you have no permission.

%d bloggers like this: