
Netcat is known as the “Swiss-army Knife of TCP/IP because of its large list of rich features that makes it so popular. O o o o o o o o o o o Outbound or inbound connections, TCP or UDP, to or from any ports Full DNS forward/reverse checking, with appropriate warnings Ability to use any local source port Ability to use any locally-configured network source address Built-in port-scanning capabilities, with randomizer Built-in loose source-routing capability Can read command line arguments from standard input Slow-send mode, one line every N seconds Hex dump of transmitted and received data Optional ability to let another program service established connections Optional telnet-options responder

According to the official website of Netcat, the developer lists its major features as: Netcat was designed to be a command line utility but it also allows a user to make it a back-end device of an application or script to make tasks more automated. Since it has so many features available and is such a powerful tool, hackers have also been able to take advantage of its many features using it for mischievous tasks. Netcat was designed to be a simple UNIX utility with a rich features list allowing it to do many different type of network functionalities to help network administrators troubleshoot and debug network issues.

Since then there has been no significant improvements on this utility by the original developer, except that the tool is open source allowing other developers the ability to add any features they would like to see or expand on. Netcat was created in the early 1990’s by a developer named *Hobbit*, with the last stable release being in 1996, at version 1.10. Historically it gets its name from the old UNIX tool ‘cat’ which is write data to a standard output, while this new tool can read and write data on a network connection. Netcat is a network utility that that can read and write data on a TCP or UDP connection. In this second experiment will determine many different factors about Netcat compared to an actual port scanner and determine which is faster, which is more actuate with information it delivers to the user, and finally flexibility of each tool to perform other tasks.

In this experiment I will be testing the advanced features of Netcat on my home network, as well as comparing some of the footprinting and scanning features of Netcat to another tool called Nmap.

School of Computer Science University of WindsorĬONTENTS. Security & Privacy on the Internet (03-60-467) Fall 2009
