BASIC NETWORK PENETRATION TESTING WITH THE NETWORK TOOL NETCAT IN LINUX-BASED OPERATING SYSTEMS
BASIC NETWORK PENETRATION TESTING WITH THE NETWORK TOOL NETCAT IN LINUX-BASED OPERATING SYSTEMS
DOI:
https://doi.org/10.46687/jsar.v25i1.377Keywords:
Connection, Linux, Monitoring, Penetration, Port, Reverse shell, Scanning, Security, Sniffer, Testing, TCP, Traffic, UDP, VulnerabilityAbstract
In this scientific article a basic network penetration testing with the network tool Netcat in Linux-based operating systems is presented.
References
Acosta, J.C., 2022, June. Poster: Toward Dynamic, Session-Preserving, Transition from Low to High Interaction Honeypots. In Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies (pp. 255-257).
Ahmad, S.S. and Anwar, M.A., 2016. Design and Implementation of Intelligent Network Configuration Tool. Indian Journal of Science and Technology, 9, p.48.
Armstrong, T., 2001. Netcat-The TCP/IP Swiss Army Knife.
Asrodia, Pallavi, and Hemlata Patel. "Network traffic analysis using packet sniffer." International journal of engineering research and applications 2, no. 3 (2012): 854-856.
Barman, F., Alkaabi, N., Almenhali, H., Alshedi, M. and Ikuesan, R., 2023, June. A Methodical Framework for Conducting Reconnaissance and Enumeration in the Ethical Hacking Lifecycle. In European Conference on Cyber Warfare and Security (Vol. 22, No. 1, pp. 54-64).
Boyanov, P., Implementation of modified script for Linux based operating systems using a linear algorithm for network port scanning. A refereed Journal Scientific and Applied Research, Konstantin Preslavsky University Press, Vol. 23, Shumen, 2022, ISSN 1314-6289 (Print), ISSN 2815-4622 (Online), pp. 48-59, DOI: https://doi.org/10.46687/jsar.v23i1.353.
Boyanov, P., A comprehensive scanning for open, closed and filtered ports in the computer systems and networks. A refereed Journal Scientific and Applied Research, Konstantin Preslavsky University Press, Vol. 23, Shumen, 2022, ISSN 1314-6289 (Print), ISSN 2815-4622 (Online), pp. 85-98, DOI: https://doi.org/10.46687/jsar.v23i1.356.
Florin, V. and Codruta, V., 2009. Portable UDP port forwarding in user space. Journal of Computer Science and Control Systems, (1), p.75.
Gibbins, N., Lab 1-HTTP.
Giacobbi, G., 2005. The GNU Netcat–Official homepage.
Giacobbi, G., 2014. The GNU Netcat Project.“. URL http://netcat. sourceforge. net.
Iliev, R., K. Ignatova. Cloud technologies for building data center system for defense and security. T. Tagarev et al. (eds.), Digital Transformation, Cyber Security and Resilience of Modern Societies, Studies in Big Data 84, , ISBN 978-3-030-65721-5, Springer 2020, pp. 13-24, https://doi.org/10.1007/978-3-030-65722-2.
Kanclirz, J. ed., 2008. Netcat power tools. Elsevier.
Kondo, T.S. and Mselle, L.J., 2014. Penetration testing with banner grabbers and packet sniffers. Journal of Emerging Trends in computing and information sciences, 5(4), pp.321-327.
Kostaras, I., Drabo, C., Juneau, J., Reimers, S., Schröder, M., Wielenga, G., Kostaras, I., Drabo, C., Juneau, J., Reimers, S. and Schröder, M., 2020. The NetCAT Program on Testing. Pro Apache NetBeans: Building Applications on the Rich Client Platform, pp.431-440.
Kurth, M., Gras, B., Andriesse, D., Giuffrida, C., Bos, H. and Razavi, K., 2020, May. NetCAT: Practical cache attacks from the network. In 2020 IEEE Symposium on Security and Privacy (SP) (pp. 20-38). IEEE.
Maarala, A.I., Rautiainen, M., Salmi, M., Pirttikangas, S. and Riekki, J., 2015, October. Low latency analytics for streaming traffic data with Apache Spark. In 2015 IEEE International Conference on Big Data (Big Data) (pp. 2855-2858). IEEE.
Patel, J., 2011. Forensic Tools Matrix: The Process of Computer Forensic for Digital Evidence Collection. International Journal of Managment, IT and Engineering, 1(7), pp.200-209.
Pavlova, D., Dzhelepov, V., Gindev, P., Effectiveness of information security in computer systems for object and process management. 13th International traveling seminar, Modern dimensions in European education and research area. Bulgarian-Austrian cultural dialogue, 26-31 May 2019, Sofia, “ZA BUKVITE – O Pismeneh” Publishing House, vol. 7, 2019, pp. 241-249. ISSN 2367-7988.
Pinart, C. and Junyent, G., 2005, March. NetCat: Cross-plane approach for dynamic, distributed service provisioning in a GMPLS enabled optical testbed. In National Fiber Optic Engineers Conference (p. NThJ2). Optica Publishing Group.
Resendez, I., Martinez, P. and Abraham, J., 2014. An introduction to digital forensics. Research Gate, June, 17.
Roth, B.D., Chandra, S., Grzech, M.P. and Ferrante, F.E., 1995. NetCAT: A New Software Tool for Designing. The Telecommunications Review, p.55.
Shaker, A.M.N.F. and Mohamed, A.M., 2021, August. Zero Click Attack. In The International Undergraduate Research Conference (Vol. 5, No. 5, pp. 46-49). The Military Technical College.
Yerrid, K. C. Instant Netcat Starter. Packt Publishing Ltd, 2013.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 JOURNAL SCIENTIFIC AND APPLIED RESEARCH
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.