NCAT
This is Nmap's version of netcat. It's a powerful network utility for reading/writing data over TCP/UDP.
root@oco:~$ ncat -nv --source-port 53 10.129.62.106 22
* tells ncat not to perform DNS resolution, which speeds up the connection.
* enables verbose output, showing connection progress and status.
* forces the outgoing connection to use UDP/TCP source port 53 (usually reserved for DNS).
- Using --source-port 53 is a firewall evasion trick. Many firewalls:
Allow DNS (port 53) traffic out by default.
Do not inspect source ports as closely as destination ports.
By setting the source port to 53:
The connection may bypass egress filters that block most high ports.
It might avoid triggering intrusion detection systems trained to watch for scans or attacks from high-numbered source ports.
Last updated