Netcat: Attack & Detection Techniques
Netcat Weaponisation: Attack Techniques & Detection Cheatsheet
Overview
Learning Workflow
Phase 1: Netcat Foundations
Netcat Variants
Variant
Description
Key Features
Core Syntax
Identifying Installed Variants
Phase 2: Reconnaissance Detection
Attack Techniques
Port Scanning
Banner Grabbing
Service Fingerprinting
Detection Strategies
Log Indicators
Network Detection
Host-Based Detection
Detection Script
Defensive Measures
Phase 3: Initial Access Detection
Attack Techniques
Bind Shell (Attacker Connects to Victim)
Reverse Shell (Victim Connects to Attacker)
Payload Delivery
Detection Strategies
Log Indicators
Network Detection
Process-Based Detection
Detection Script
Defensive Measures
Phase 4: Execution Detection
Attack Techniques
Remote Command Execution
Interactive Shell Upgrade
Staged Execution
Detection Strategies
Log Indicators
Process Detection
Network Detection
Detection Script
Phase 5: Persistence Detection
Attack Techniques
Cron-Based Persistence
Systemd Service Persistence
Init Script Persistence
Shell Profile Persistence
Binary Replacement Persistence
Detection Strategies
Log Indicators
File System Detection
Detection Script
Auditd Rules for Persistence
Phase 6: Privilege Escalation Detection
Attack Techniques
SUID Netcat Exploitation
Capability Abuse
Exploiting Privileged Processes
Sudo Misconfiguration Exploitation
Detection Strategies
Phase 7: Defense Evasion Detection
Attack Techniques
Process Name Obfuscation
Encrypted Channels
Traffic Obfuscation
Living Off The Land
Log Evasion
Detection Strategies
Obfuscation Detection
Encrypted Channel Detection
Detection Script
Phase 8: Credential Access Detection
Attack Techniques
Credential Harvesting Relay
Keylogger Relay
Password File Exfiltration
Memory Credential Dumping
Detection Strategies
Phase 9: Discovery Detection
Attack Techniques
Network Discovery
Internal Reconnaissance
Detection Strategies
Phase 10: Lateral Movement Detection
Attack Techniques
Pivoting Through Compromised Hosts
Port Forwarding
SOCKS Proxy Creation
File Transfer Laterally
Detection Strategies
Detection Script
Phase 11: Collection Detection
Attack Techniques
Data Staging
Clipboard Capture
Screen Capture
Archive Creation
Detection Strategies
Phase 12: Command & Control Detection
Attack Techniques
Basic C2 Channel
Resilient C2
Encrypted C2
Covert Channels
Detection Strategies
Beaconing Detection
C2 Traffic Analysis
Detection Script
Phase 13: Exfiltration Detection
Attack Techniques
Direct File Exfiltration
Compressed Exfiltration
Chunked Exfiltration
Scheduled Exfiltration
Covert Channel Exfiltration
Detection Strategies
Network Monitoring
File Access Monitoring
Detection Script
Additional Attack Types
Port Knocking with Netcat
Man-in-the-Middle with Netcat
UDP Attacks
Comprehensive Detection Script
Quick Reference Card
Common Attack Patterns
Attack
Command
Detection
Detection Commands
Task
Command
Defensive Rules
Log Locations
Log
Content
MITRE ATT&CK Mapping
Tactic
Technique
Netcat Usage
Last updated