Description: Netcat Remote Bind Shell is Part 3 of the video series on Netcat usage basics. In this video we will look at how to bind a shell to a port and allow a remote Client to send arbitrary commands. Behind the scenes Netcat maps the stdin, stdout and stderr of bash to the socket. Thus all inputs sent by the Client is interpreted as command line input in bash and all command outputs are sent back by bash to the Client will be through the network socket. Interestingly, Remote Bind Shell is the most common technique used by hackers to access remote systems. Also, in many cases such as the Blaster Worm, the windows cmd.exe (bash on windows) was bound to a remote port of the victim. Using this cmd.exe the worm used the tftp protocol to get a copy of itself and further propagate. Links: <br><br>1. Netcat Homepage <br><br>2. Download Netcat<br><br>
Tags: tools ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.