Via: The Genius
Netcat actually not a hacking tool. It is networking tools. We can use it to communicate with other computers remotely, data transfer etc. But We can also use it as Backdoor or hacking tools. “ping” is not hacking or DoS tool but we can DoS using “Ping” …no? That is why we can’t call it DDOSER tool.
Anyway, Often netcat called “Swiss Army Knife”
I will explain the basic usage of it now
All option in netcat:
nc -h
[v1.10-38]
connect to somewhere: nc [-options] hostname port[s] [ports] …
listen for inbound: nc -l -p port [-options] [hostname] [port]
options:
-c shell commands as `-e’; use /bin/sh to exec [dangerous!!]
-e filename program to exec after connect [dangerous!!]
-b allow broadcasts
-g gateway source-routing hop point[s], up to 8
-G num source-routing pointer: 4, 8, 12, …
-h this cruft
-i secs delay interval for lines sent, ports scanned
-k set keepalive option on socket
-l listen mode, for inbound connects
-n numeric-only IP addresses, no DNS
-o file hex dump of traffic
-p port local port number
-r randomize local and remote ports
-q secs quit after EOF on stdin and delay of secs
-s addr local source address
-T tos set Type Of Service
-t answer TELNET negotiation
-u UDP mode
-v verbose [use twice to be more verbose]
-w secs timeout for connects and final net reads
-z zero-I/O mode [used for scanning]
port numbers can be individual or ranges: lo-hi [inclusive];
hyphens in port names must be backslash escaped (e.g. ‘ftp\-data’).
We can use netcat as backdoor, banner grabbing, port scanning, chatting, file transfer, traffic redirection etc.
Read more: here