Name |
Default Protocol |
Default Port |
---|---|---|
Back Orifice |
UDP |
31337 |
Back Orifice 2000 |
TCP/UDP |
54320/54321 |
Beast |
TCP |
6666 |
Citrix ICA |
TCP/UDP |
1494 |
Donald Dick |
TCP |
23476/23477 |
Loki |
ICMP |
NA |
Masters Paradise |
TCP |
40421/40422/40426 |
Netmeeting Remote Desktop Control |
TCP/UDP |
49608/49609 |
NetBus |
TCP |
12345 |
Netcat |
TCP/UDP |
Any |
pcAnywhere |
TCP |
5631/5632/65301 |
Reachout |
TCP |
43188 |
Remotely Anywhere |
TCP |
2000/2001 |
Remote |
TCP/UDP |
135139 |
Timbuktu |
TCP/UDP |
407 |
VNC |
TCP/UDP |
5800/5801 |
Netcat Switch |
Purpose |
---|---|
nc -d |
Used to detach Netcat from the console |
nc -l -p [port] |
Used to create a simple listening TCP port, adding u will place it into UDP mode |
nc -e [program] |
Used to redirect stdin/stdout from a program |
nc -w [timeout] |
Used to set a timeout before Netcat automatically quits |
Program | nc |
Used to pipe output of program to Netcat |
nc | program |
Used to pipe output of Netcat to program |
nc -h |
Used to display help options |
nc -v |
Used to put Netcat into verbose mode |
nc -g or nc -G |
Used to specify source routing flags |
nc -t |
Used for Telnet negotiation |
nc -o [file] |
Used to hex dump traffic to file |
nc -z |
Used for port scanning, no I/O i |
Sniffers |
Part I: Exam Preparation
The Business Aspects of Penetration Testing
The Technical Foundations of Hacking
Footprinting and Scanning
Enumeration and System Hacking
Linux and Automated Security Assessment Tools
Trojans and Backdoors
Sniffers, Session Hijacking, and Denial of Service
Web Server Hacking, Web Applications, and Database Attacks
Wireless Technologies, Security, and Attacks
IDS, Firewalls, and Honeypots
Buffer Overflows, Viruses, and Worms
Cryptographic Attacks and Defenses
Physical Security and Social Engineering
Part II: Final Review
Part III: Appendixes
Appendix A. Using the ExamGear Special Edition Software