BASIC NETWORK PENETRATION TESTING WITH THE NETWORK TOOL NETCAT IN LINUX-BASED OPERATING SYSTEMS

BASIC NETWORK PENETRATION TESTING WITH THE NETWORK TOOL NETCAT IN LINUX-BASED OPERATING SYSTEMS

Authors

  • Petar Boyanov Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences, Bulgaria

DOI:

https://doi.org/10.46687/jsar.v25i1.377

Keywords:

Connection, Linux, Monitoring, Penetration, Port, Reverse shell, Scanning, Security, Sniffer, Testing, TCP, Traffic, UDP, Vulnerability

Abstract

In this scientific article a basic network penetration testing with the network tool Netcat in Linux-based operating systems is presented.

Author Biography

Petar Boyanov, Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences, Bulgaria

Petar Boyanov, Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences, Bulgaria, ORCID iD icon https://orcid.org/0000-0003-3668-6713

References

Acosta, J.C., 2022, June. Poster: Toward Dynamic, Session-Preserving, Transition from Low to High Interaction Honeypots. In Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies (pp. 255-257).

Ahmad, S.S. and Anwar, M.A., 2016. Design and Implementation of Intelligent Network Configuration Tool. Indian Journal of Science and Technology, 9, p.48.

Armstrong, T., 2001. Netcat-The TCP/IP Swiss Army Knife.

Asrodia, Pallavi, and Hemlata Patel. "Network traffic analysis using packet sniffer." International journal of engineering research and applications 2, no. 3 (2012): 854-856.

Barman, F., Alkaabi, N., Almenhali, H., Alshedi, M. and Ikuesan, R., 2023, June. A Methodical Framework for Conducting Reconnaissance and Enumeration in the Ethical Hacking Lifecycle. In European Conference on Cyber Warfare and Security (Vol. 22, No. 1, pp. 54-64).

Boyanov, P., Implementation of modified script for Linux based operating systems using a linear algorithm for network port scanning. A refereed Journal Scientific and Applied Research, Konstantin Preslavsky University Press, Vol. 23, Shumen, 2022, ISSN 1314-6289 (Print), ISSN 2815-4622 (Online), pp. 48-59, DOI: https://doi.org/10.46687/jsar.v23i1.353.

Boyanov, P., A comprehensive scanning for open, closed and filtered ports in the computer systems and networks. A refereed Journal Scientific and Applied Research, Konstantin Preslavsky University Press, Vol. 23, Shumen, 2022, ISSN 1314-6289 (Print), ISSN 2815-4622 (Online), pp. 85-98, DOI: https://doi.org/10.46687/jsar.v23i1.356.

Florin, V. and Codruta, V., 2009. Portable UDP port forwarding in user space. Journal of Computer Science and Control Systems, (1), p.75.

Gibbins, N., Lab 1-HTTP.

Giacobbi, G., 2005. The GNU Netcat–Official homepage.

Giacobbi, G., 2014. The GNU Netcat Project.“. URL http://netcat. sourceforge. net.

Iliev, R., K. Ignatova. Cloud technologies for building data center system for defense and security. T. Tagarev et al. (eds.), Digital Transformation, Cyber Security and Resilience of Modern Societies, Studies in Big Data 84, , ISBN 978-3-030-65721-5, Springer 2020, pp. 13-24, https://doi.org/10.1007/978-3-030-65722-2.

Kanclirz, J. ed., 2008. Netcat power tools. Elsevier.

Kondo, T.S. and Mselle, L.J., 2014. Penetration testing with banner grabbers and packet sniffers. Journal of Emerging Trends in computing and information sciences, 5(4), pp.321-327.

Kostaras, I., Drabo, C., Juneau, J., Reimers, S., Schröder, M., Wielenga, G., Kostaras, I., Drabo, C., Juneau, J., Reimers, S. and Schröder, M., 2020. The NetCAT Program on Testing. Pro Apache NetBeans: Building Applications on the Rich Client Platform, pp.431-440.

Kurth, M., Gras, B., Andriesse, D., Giuffrida, C., Bos, H. and Razavi, K., 2020, May. NetCAT: Practical cache attacks from the network. In 2020 IEEE Symposium on Security and Privacy (SP) (pp. 20-38). IEEE.

Maarala, A.I., Rautiainen, M., Salmi, M., Pirttikangas, S. and Riekki, J., 2015, October. Low latency analytics for streaming traffic data with Apache Spark. In 2015 IEEE International Conference on Big Data (Big Data) (pp. 2855-2858). IEEE.

Patel, J., 2011. Forensic Tools Matrix: The Process of Computer Forensic for Digital Evidence Collection. International Journal of Managment, IT and Engineering, 1(7), pp.200-209.

Pavlova, D., Dzhelepov, V., Gindev, P., Effectiveness of information security in computer systems for object and process management. 13th International traveling seminar, Modern dimensions in European education and research area. Bulgarian-Austrian cultural dialogue, 26-31 May 2019, Sofia, “ZA BUKVITE – O Pismeneh” Publishing House, vol. 7, 2019, pp. 241-249. ISSN 2367-7988.

Pinart, C. and Junyent, G., 2005, March. NetCat: Cross-plane approach for dynamic, distributed service provisioning in a GMPLS enabled optical testbed. In National Fiber Optic Engineers Conference (p. NThJ2). Optica Publishing Group.

Resendez, I., Martinez, P. and Abraham, J., 2014. An introduction to digital forensics. Research Gate, June, 17.

Roth, B.D., Chandra, S., Grzech, M.P. and Ferrante, F.E., 1995. NetCAT: A New Software Tool for Designing. The Telecommunications Review, p.55.

Shaker, A.M.N.F. and Mohamed, A.M., 2021, August. Zero Click Attack. In The International Undergraduate Research Conference (Vol. 5, No. 5, pp. 46-49). The Military Technical College.

Yerrid, K. C. Instant Netcat Starter. Packt Publishing Ltd, 2013.

Downloads

Published

29.11.2023

How to Cite

Boyanov, P. (2023). BASIC NETWORK PENETRATION TESTING WITH THE NETWORK TOOL NETCAT IN LINUX-BASED OPERATING SYSTEMS: BASIC NETWORK PENETRATION TESTING WITH THE NETWORK TOOL NETCAT IN LINUX-BASED OPERATING SYSTEMS. JOURNAL SCIENTIFIC AND APPLIED RESEARCH, 25(1), 15–30. https://doi.org/10.46687/jsar.v25i1.377

Issue

Section

Communication and computer technologies

Most read articles by the same author(s)

1 2 3 4 5 6 7 8 > >>