1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
|
.\" $OpenBSD: nc.1,v 1.11 2000/09/26 01:41:44 ericj Exp $
.\"
.\" Copyright (c) 1996 David Sacerdote
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. The name of the author may not be used to endorse or promote products
.\" derived from this software without specific prior written permission
.\"
.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.Dd August 1, 1996
.Dt NC 1
.Os
.Sh NAME
.Nm nc
.Nd "arbitrary TCP and UDP connections and listens"
.Sh SYNOPSIS
.Nm nc
.Op Fl lnrtuvz
.Op Fl e Ar command
.Op Fl g Ar intermediates
.Op Fl G Ar hopcount
.Op Fl i Ar interval
.Op Fl o Ar filename
.Op Fl p Ar source port
.Op Fl s Ar ip address
.Op Fl w Ar timeout
.Op Ar hostname
.Op Ar port[s...]
.Sh DESCRIPTION
The
.Nm
(or
.Nm netcat )
utility is used for just about anything under the sun
involving TCP or UDP.
It can open TCP connections, send UDP packets,
listen on arbitrary TCP and UDP ports, do port scanning, and source
routing.
Unlike
.Xr telnet 1 ,
.Nm
scripts nicely, and separates error messages onto standard error instead
of sending them to standard output, as
.Xr telnet 1
does with some.
.Pp
Destination ports can be single integers, names as listed in
.Xr services 5 ,
or ranges.
Ranges are in the form nn-mm, and several separate ports and/or
ranges may be specified on the command line.
.Pp
Common uses include:
.Pp
.Bl -bullet -offset indent -compact
.It
simple TCP proxies
.It
shell\-script based HTTP clients and servers
.It
network daemon testing
.It
source routing based connectivity testing
.It
and much, much more
.El
.Pp
The options are as follows:
.Bl -tag -width Ds
.It Fl g Ar intermediate-host
Specifies a hop along a loose source routed path.
Can be used more than once to build a chain of hop points.
.It Fl G Ar pointer
Positions the
.Dq hop counter
within the list of machines in the path of a source routed packet.
Must be a multiple of 4.
.It Fl i Ar seconds
Specifies a delay time interval between lines of text sent and received.
Also causes a delay time between connections to multiple ports.
.It Fl l
Is used to specify that
.Nm
should listen for an incoming connection, rather than initiate a
connection to a remote host.
Any hostname/IP address and port arguments
restrict the source of inbound connections to only that address and
source port.
.It Fl n
Do not do DNS lookups on any of the specified addresses or hostnames, or
names of port numbers from /etc/services.
.It Fl o Ar filename
Create a hexadecimal log of data transferred in the specified file.
Each line begins with
.Ql <
or
.Ql > .
.Ql <
means
.Dq from the net
and
.Ql >
means
.Dq to the net .
.It Fl p Ar port
Specifies the source port
.Nm
should use, subject to privilege restrictions and availability.
.It Fl r
Specifies that source and/or destination ports should be chosen semi-randomly
instead of sequentially within a range or in the order that the
system assigns.
.It Fl s Ar hostname/ip-address
Specifies the IP of the interface which is used to send the packets.
On some platforms, this can be used for UDP spoofing by using
.Xr ifconfig 8
to bring up a dummy interface with the desired source IP address.
.It Fl t
Causes
.Nm
to send RFC854 DON'T and WON'T responses to RFC854 DO
and WILL requests.
This makes it possible to use
.Nm
to script telnet sessions.
The presence of this option can be
enabled or disabled as a compile-time option.
.It Fl u
Use UDP instead of TCP.
On most platforms,
.Nm
will behave as if a connection is established until it receives an
ICMP packet indicating that there is no program listening to what it
sends.
.It Fl v
Verbose.
Cause
.Nm
to display connection information.
Using
.Fl v
more than once will cause
.Nm
to become even more verbose.
.It Fl w Ar timeout
Specifies the number of seconds
.Nm
should wait before deciding that
an attempt to establish a connection is hopeless.
Also used to specify how long to wait for more network data after standard
input closes.
.It Fl z
Specifies that
.Nm
should just scan for listening
daemons, without sending any data to them.
Diagnostic messages about refused connections will not be displayed unless
.Fl v
is specified twice.
.El
.Sh EXAMPLES
.Bl -tag -width x
.It Li "nc"
Wait for the user to type what would normally be command-line
arguments on stdin.
.It Li "nc example.host 42"
Open a TCP connection to port 42 of example.host.
If the connection
fails, do not display any error messages, but simply exit.
.It Li "nc -p 31337 example.host 42"
Open a TCP connection to port 42 of example.host, and use port 31337
as the source port.
.It Li "nc -w 5 example.host 42"
Open a TCP connection to port 42 of example.host, and time out after
five seconds while attempting to connect.
.It Li "nc -u example.host 53"
Send any data from stdin
to UDP port 53 of example.host, and display any data returned.
.It Li "nc -s 10.1.2.3 example.host 42"
Open a TCP connection to port 42 of example.host using 10.1.2.3 as the
IP for the local end of the connection.
.It Li "nc -v example.host 42"
Open a TCP connection to port 42 of example.host, displaying some
diagnostic messages on stderr.
.It Li "nc -v -v example.host 42"
Open a TCP connection to port 42 of example.host, displaying all
diagnostic messages on stderr.
.It Li "nc -v -z example.host 20-30"
Attempt to open TCP connections to ports 20 through 30 of
example.host, and report which ones
.Nm
was able to connect to.
.It Li "nc -v -u -z -w 3 example.host 20-30"
Send UDP packets to ports 20-30 of example.host, and report which ones
did not respond with an ICMP packet after three seconds.
.It Li "nc -l -p 3000"
Listen on TCP port 3000, and once there is a connection, send stdin to
the remote host, and send data from the remote host to stdout.
.It Li "echo foobar | nc example.host 1000"
Connect to port 1000 of example.host, send the string "foobar"
followed by a newline, and move data from port 1000 of example.host to
stdout until example.host closes the connection.
.El
.Sh SEE ALSO
.Xr cat 1 ,
.Xr telnet 1
.Pp
The
.Nm netcat
.Pa README .
.Sh AUTHOR
*Hobbit* [hobbit@avian.org]
|