NCAT

This is Nmap's version of netcat. It's a powerful network utility for reading/writing data over TCP/UDP.

root@oco:~$ ncat -nv --source-port 53 10.129.62.106 22

 * tells ncat not to perform DNS resolution, which speeds up the connection.
 * enables verbose output, showing connection progress and status.
 * forces the outgoing connection to use UDP/TCP source port 53 (usually reserved for DNS).
    - Using --source-port 53 is a firewall evasion trick. Many firewalls:
       Allow DNS (port 53) traffic out by default.
       Do not inspect source ports as closely as destination ports.
       By setting the source port to 53:
       The connection may bypass egress filters that block most high ports.
       It might avoid triggering intrusion detection systems trained to watch for scans or attacks from high-numbered source ports.

Last updated