-
Notifications
You must be signed in to change notification settings - Fork 30
/
Copy pathnc.1
139 lines (139 loc) · 5.32 KB
/
nc.1
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
.TH NC 1
.SH NAME
nc \- TCP/IP swiss army knife
.SH SYNOPSIS
.B nc
.I "[-options] hostname port[s] [ports] ..."
.br
.B nc
.I "-l -p port [-options] [hostname] [port]"
.SH "DESCRIPTION"
.B netcat
is a simple unix utility which reads and writes data across network
connections, using TCP or UDP protocol. It is designed to be a
reliable "back-end" tool that can be used directly or easily driven by
other programs and scripts. At the same time, it is a feature-rich
network debugging and exploration tool, since it can create almost any
kind of connection you would need and has several interesting built-in
capabilities. Netcat, or "nc" as the actual program is named, should
have been supplied long ago as another one of those cryptic but
standard Unix tools.
.P
In the simplest usage, "nc host port" creates a TCP connection to the
given port on the given target host. Your standard input is then sent
to the host, and anything that comes back across the connection is
sent to your standard output. This continues indefinitely, until the
network side of the connection shuts down. Note that this behavior is
different from most other applications which shut everything down and
exit after an end-of-file on the standard input.
.P
Netcat can also function as a server, by listening for inbound
connections on arbitrary ports and then doing the same reading and
writing. With minor limitations, netcat doesn't really care if it
runs in "client" or "server" mode -- it still shovels data back and
forth until there isn't any more left. In either mode, shutdown can be
forced after a configurable time of inactivity on the network side.
.P
And it can do this via UDP too, so netcat is possibly the "udp
telnet-like" application you always wanted for testing your UDP-mode
servers. UDP, as the "U" implies, gives less reliable data
transmission than TCP connections and some systems may have trouble
sending large amounts of data that way, but it's still a useful
capability to have.
.P
You may be asking "why not just use telnet to connect to arbitrary
ports?" Valid question, and here are some reasons. Telnet has the
"standard input EOF" problem, so one must introduce calculated delays
in driving scripts to allow network output to finish. This is the
main reason netcat stays running until the *network* side closes.
Telnet also will not transfer arbitrary binary data, because certain
characters are interpreted as telnet options and are thus removed from
the data stream. Telnet also emits some of its diagnostic messages to
standard output, where netcat keeps such things religiously separated
from its *output* and will never modify any of the real data in
transit unless you *really* want it to. And of course telnet is
incapable of listening for inbound connections, or using UDP instead.
Netcat doesn't have any of these limitations, is much smaller and
faster than telnet, and has many other advantages.
.SH OPTIONS
.TP 13
.I \-h
display help
.TP 13
.I \-i secs
delay interval for lines sent, ports scanned
.TP 13
.I \-l
listen mode, for inbound connects
.TP 13
.I \-n
numeric-only IP addresses, no DNS
.TP 13
.I \-o file
hex dump of traffic
.TP 13
.I \-p port
local port number (port numbers can be individual or ranges: lo-hi
[inclusive])
.TP 13
.I \-q seconds
after EOF is detected, wait the specified number of seconds and then
quit.
.TP 13
.I \-b
allow UDP broadcasts
.TP 13
.I \-r
randomize local and remote ports
.TP 13
.I \-s addr
local source address
.TP 13
.I \-t
enable telnet negotiation
.TP 13
.I \-e prog
specify program to exec after connect (use with caution)
.TP 13
.I \-u
UDP mode
.TP 13
.I \-v
verbose [use twice to be more verbose]
.TP 13
.I \-w secs
timeout for connects and final net reads
.TP 13
.I \-z
zero-I/O mode [used for scanning]
.SH COPYRIGHT
Netcat is entirely *Hobbit*'s own creation, although plenty of other code
was used as examples. It is freely given away to the Internet community
in the hope that it will be useful, with no restrictions except giving
credit where it is due. No GPLs, Berkeley copyrights or any of that
nonsense. The author assumes NO responsibility for how anyone uses
it. If netcat makes you rich somehow and you're feeling generous,
mail me a check. If you are affiliated in any way with Microsoft
Network, get a life. Always ski in control. Comments, questions, and
patches to [email protected].
.P
This release is not an attempt to steal *Hobbit*'s merits as Netcat's
author, but rather to keep an extraordinarily useful tool in pace with
the changes in the Internet, and to make an extraordinarily instructive
piece of code even more so.
.SH BUGS
Efforts have been made to have netcat "do the right thing" in all its
various modes. If you believe that it is doing the wrong thing under
whatever circumstances, please notify me and tell me how you think it
should behave. If netcat is not able to do some task you think up,
minor tweaks to the code will probably fix that. It provides a basic
and easily-modified template for writing other network applications,
and I certainly encourage people to make custom mods and send in any
improvements they make to it. Continued feedback from the Internet
community is always welcome!
.SH AUTHOR
This manual page was written by Joey Hess <[email protected]> and
Robert Woodcock <[email protected]>, cribbing heavily from Netcat's
README file.
.P
Netcat was written by a guy we know as the Hobbit <[email protected]>.