Using Netcat with Ngrok part 1
Read Time2 Minutes, 33 Seconds

Welcome to hacking a rise i am the Laughing man in this short post im going to show ya a handy way to use ncat with ngrok to forward ports over ssh whoop let just say how fucking great ngrok is whoop whoop now lets get stuck in to this tutorial……….

What is Ncat (Netcat)

Netcat is a computer networking utility for reading from and writing to network connections using TCP or UDP. The command is designed to be a dependable back-end that can be used directly or easily driven by other programs and scripts .

What is Ngrok

Ngrok is a multiplatform tunnelling, reverse proxy software that establishes secure tunnels from a public endpoint such as internet to a locally running network service while capturing all traffic for detailed inspection and replay.Source: https://ngrok.com/

how to install and setup

First, download the ngrok client, a single binary with zero run-time dependencies.

Download :Linux

unzip /path/to/ngrok.zip
Most people like to keep ngrok in their primary user folder or set an alias for easy command-line access.

Connect your account
Running this command will add your authtoken to your ngrok.yml file. Connecting an account will list your open tunnels in the dashboard, give you longer tunnel timeouts, and more. Visit the dashboard to get your auth token.

./ngrok authtoken
Don’t have an account?Sign up for free to get your auth token.
Fire it up
Try it out by running it from the command line:

./ngrok help
To start a HTTP tunnel on port 80, run this next:

./ngrok http 80
Read the documentation to get more ideas on how to use ngrok.

The setup

now we have Ngrok installed we can now start it so in terminal type cd Ngrok if u have it in the main directory if not cd to the file u have ngrok installed once there type ./ngrok tcp 1337

Hacking A Rise ncat-ngrok Using Netcat with Ngrok part 1 Exploits Exploits FEATURED Metasploit Pentesting

now we’re done leave you ngrok window open and open a new terminal now we have to connect ncat so in the new terminal we ncat -l 1337 or netcat -l 1337

Hacking A Rise netcat-l1337 Using Netcat with Ngrok part 1 Exploits Exploits FEATURED Metasploit Pentesting

now we can use this shell to full meterpreter payload on the targets device as long as we have connection

but we can save that for the next tutorial as im not bothered taking pics lol and im tired

Final thoughts and Disclaimer

Netcat is handy is getting a shell in to the system but what you real want is a Meterpreter as remember more power over the device is fun .

Disclamer


This article is only for an Educational purpose. Any actions and or activities related to the material contained within this Website is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question. The Authors and https://hackingarise.com will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law

find out what else you can do with ngrok here : How to use TheFatRat and Ngrok and Armitage

0 0
Hacking A Rise b57300e9e62f2b0295a138eefa166abf?s=400&is-pending-load=1#038;d=mm&r=g Using Netcat with Ngrok part 1 Exploits Exploits FEATURED Metasploit Pentesting   Hacking A Rise b57300e9e62f2b0295a138eefa166abf?s=400&d=mm&r=g Using Netcat with Ngrok part 1 Exploits Exploits FEATURED Metasploit Pentesting

About Post Author

Laughingman

Hi im the laughing man im a pentester and the owner of Hacking a rise
0 %
Happy
0 %
Sad
0 %
Excited
0 %
Angry
0 %
Surprise
pentester
Hi im the laughing man im a pentester and the owner of Hacking a rise