Netcat-WaRlOrD
- Type:
- Applications > Windows
- Files:
- 2
- Size:
- 31.75 KB
- Tag(s):
- netcat warlord
- Quality:
- +0 / -0 (0)
- Uploaded:
- Jun 8, 2009
- By:
- bitpirate
What is Netcat? !!!!This is THE shit!!!! --------------- --------------- Netcat is a computer networking service for reading from and writing network connections using TCP or UDP. Netcat is designed to be a dependable “back-end†device that can be used candidly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and investigation tool, since it can produce almost any kind of correlation you would need and has a number of exciting built-in capabilities. Virus control: http://www.virustotal.com/nl/analisis/be4211fe5c1a19ff393a2bcfa21dad8d0a687663263a63789552bda446d9421b-1244307348 a-squared 4.0.0.101 2009.06.04 Virtool!IK AhnLab-V3 5.0.0.2 2009.06.05 - AntiVir 7.9.0.180 2009.06.06 SPR/RemoteAdmin.Net Antiy-AVL 2.0.3.1 2009.06.05 RemoteAdmin/Win32.RA Authentium 5.1.2.4 2009.06.05 W32/Netcat Avast 4.8.1335.0 2009.06.05 - AVG 8.5.0.339 2009.06.06 RemoteAdmin.T BitDefender 7.2 2009.06.06 - CAT-QuickHeal 10.00 2009.06.06 Trojan.Agent.ATV ClamAV 0.94.1 2009.06.06 PUA.NetTool.Netcat-7 Comodo 1203 2009.06.06 ApplicUnsaf.Win32.RemoteAdmin DrWeb 5.0.0.12182 2009.06.06 Tool.Netcat eSafe 7.0.17.0 2009.06.04 Win32.HackTool eTrust-Vet 31.6.6542 2009.06.05 - F-Prot 4.4.4.56 2009.06.05 W32/Netcat F-Secure 8.0.14470.0 2009.06.05 Riskware:W32/NetCat.D Fortinet 3.117.0.0 2009.06.06 HackerTool/Netcat GData 19 2009.06.06 - Ikarus T3.1.1.59.0 2009.06.06 - K7AntiVirus 7.10.754 2009.06.04 Non-Virus:RemoteAdmin.Win32.NetCat Kaspersky 7.0.0.125 2009.06.06 not-a-virus:RemoteAdmin.Win32.NetCat.jd McAfee 5637 2009.06.05 - McAfee+Artemis 5637 2009.06.05 - McAfee-GW-Edition 6.7.6 2009.06.06 Riskware.RemoteAdmin.Net Microsoft 1.4701 2009.06.06 - NOD32 4135 2009.06.06 Win32/RemoteAdmin Norman 2009.06.05 - nProtect 2009.1.8.0 2009.06.06 - Panda 10.0.0.14 2009.06.06 HackTool/NetCat.A PCTools 4.4.2.0 2009.06.06 - Prevx 3.0 2009.06.06 - Rising 21.32.52.00 2009.06.06 Backdoor.Ncx.b Sophos 4.42.0 2009.06.06 NetCat Sunbelt 3.2.1858.2 2009.06.06 - Symantec 1.4.4.12 2009.06.06 - TheHacker 6.3.4.3.340 2009.06.05 Aplicacion/RemAdm.Netcat TrendMicro 8.950.0.1092 2009.06.06 - VBA32 3.12.10.6 2009.06.06 - ViRobot 2009.6.5.1771 2009.06.05 Not_a_virus:RemoteAdmin.NetCat.59392 VirusBuster 4.6.5.0 2009.06.06 - Extra informatie File size: 59392 bytes MD5 : e0fb946c00b140693e3cf5de258c22a1 SHA1 : 57f0839433234285cc9df96198a6ca58248a4707 SHA256: be4211fe5c1a19ff393a2bcfa21dad8d0a687663263a63789552bda446d9421b PEInfo: PE Structure information ( base data ) entrypointaddress.: 0x4C00 timedatestamp.....: 0x34AE8EB9 (Sat Jan 3 20:17:13 1998) machinetype.......: 0x14C (Intel I386) ( 4 sections ) name viradd virsiz rawdsiz ntrpy md5 .text 0x1000 0x9770 0x9800 6.51 99fea9cdbf472ed6473431666c8f7286 .rdata 0xB000 0x417 0x600 4.10 7af92dc659256dfb70036de094bfbfe7 .data 0xC000 0x5244 0x3E00 2.52 8e29d3abefc4379adcd18df2e8e81ad8 .idata 0x12000 0x75C 0x800 5.00 4aa5cc552968cbb85860988cb4c9ef64 ( 2 imports ) > kernel32.dll: ExitProcess, DisconnectNamedPipe, TerminateProcess, WaitForMultipleObjects, TerminateThread, GetLastError, CreateThread, CreatePipe, CreateProcessA, DuplicateHandle, GetCurrentProcess, ExitThread, Sleep, ReadFile, PeekNamedPipe, WriteFile, GetStdHandle, FreeConsole, VirtualFree, VirtualAlloc, LCMapStringA, SetEndOfFile, LCMapStringW, CreateFileA, GetNumberOfConsoleInputEvents, PeekConsoleInputA, HeapReAlloc, LoadLibraryA, GetStringTypeW, GetStringTypeA, GetProcAddress, SetStdHandle, SetEnvironmentVariableA, SetFilePointer, CompareStringA, GetOEMCP, CompareStringW, GetCPInfo, GetEnvironmentStringsW, GetACP, HeapFree, HeapAlloc, CloseHandle, GetTimeZoneInformation, GetSystemTime, GetLocalTime, GetCommandLineA, GetVersion, HeapDestroy, HeapCreate, RtlUnwind, FlushFileBuffers, SetHandleCount, GetFileType, GetStartupInfoA, WideCharToMultiByte, FreeEnvironmentStringsW, GetEnvironmentStrings, UnhandledExceptionFilter, GetModuleFileNameA, FreeEnvironmentStringsA, MultiByteToWideChar > wsock32.dll: -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, - ( 0 exports ) TrID : File type identification Win32 Executable MS Visual C++ (generic) (62.9%) Win32 Executable Generic (14.2%) Win32 Dynamic Link Library (generic) (12.6%) Win16/32 Executable Delphi generic (3.4%) Generic Win/DOS Executable (3.3%) ThreatExpert: http://www.threatexpert.com/report.aspx?md5=e0fb946c00b140693e3cf5de258c22a1 ssdeep: 768:pi3A+wAwcw1/GWTw8+7TAB+fThAapYgVLrORoMn+xtuHkydSsa6CvwEBRMOog:g3A+wAwjp+fTnlOR/+xtuHnK6p2Rog Prevx Info: http://info.prevx.com/aboutprogramtext.asp?PX5=09B10BBC00B12889E838005AA4FD3100E859F1A1 PEiD : InstallShield 2000 CWSandbox: http://research.sunbelt-software.com/partnerresource/MD5.aspx?md5=e0fb946c00b140693e3cf5de258c22a1 RDS : NSRL Reference Data Set ( Addison-Wesley Publishing Company Inc. ) Honeypots - Tracking Hackers: nc.exe ( SANS ) SANS system forensics, investigation and response course: nc.exe, nc_orig.exe ( Whirlwind Software ) Hackers Encyclopedia 2002: nc.exe ( Core Publishing Inc. ) Master Hacker Internet Terrorism: nc.exe ( Southeast Cybercrime Summit ) SouthEast CyberCrime Summit - Conference Abstract & Presentations: nc.exe ( McGraw-Hill Companies ) Anti-Hacker Toolkit: nc.exe ( Silver Star Publishing ) Guide to Hacking Software Security 2002: nc.exe I did NOT remove, modify, added something @ this tool. Using is on your own risk.