Essential Guide

How to hone an effective vulnerability management program

A comprehensive collection of articles, videos and more, hand-picked by our editors

Netcat tutorial: How to use the free Netcat command-line tool

Helpful for penetration testers and network admins who need to debug infected systems, the netcat command-line tool boasts many free features for enterprise use.

Capable of reading and writing across TCP or UDP connections, transferring files from remote systems and performing firewall spoofing tests --among a host of other things -- the free Netcat command-line tool boasts many features for enterprise use.

In this Netcat tutorial, Peter Giannoulis of theAcademyPro.com demonstrates how penetration testers and network admins can quickly and easily utilize this tool that's become known as the Swiss Army knife of networking.

Want more demos of free security tools? Visit our screencast page.

About the presenter:
Peter Giannoulis, GSEC, GCIH, GCIA, GCFA, GCFW, GREM, CISSP, is an information security consultant in Toronto, Ontario. He currently maintains The Academy Pro, which provides streaming video for enterprises and consumers on how to configure and troubleshoot many of today's top security products. He also serves as a technical director for GIAC.


This was first published in February 2011

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

Essential Guide

How to hone an effective vulnerability management program

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close