Linux vmi2545633.contaboserver.net 6.1.0-32-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.129-1 (2025-03-06) x86_64
Apache/2.4.62 (Debian)
Server IP : 127.0.0.1 & Your IP : 127.0.0.1
Domains :
Cant Read [ /etc/named.conf ]
User : www-data
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
share /
doc /
netcat-traditional /
Delete
Unzip
Name
Size
Permission
Date
Action
examples
[ DIR ]
drwxr-xr-x
2023-07-12 09:40
README.Debian
762
B
-rw-r--r--
2021-08-20 11:41
README.gz
23.5
KB
-rw-r--r--
1996-03-20 20:55
changelog.Debian.gz
5.84
KB
-rw-r--r--
2021-08-20 11:41
changelog.gz
2.02
KB
-rw-r--r--
1996-03-20 18:38
copyright
729
B
-rw-r--r--
2021-08-20 11:41
Save
Rename
Examples -------- Many examples can be found in /usr/share/doc/netcat-traditional/README.gz. The rest of this file collects some more that have been contributed by users. Encrypted File Transfer (courtesy of Tom Buskey <tom@buskey.name>) Suppose you have an ssh tunnel, and you want to copy a file to the remote machine. You could just scp it directly, but that opens up another connection. The goal is to re-use the existing connection. You can use netcat to do this: When you SSH in, add -L 31000:127.0.0.1:31000 On the remote: nc -lvnp 31000 127.0.0.1 > file On the local: nc -v -w 2 127.0.0.1 31000 < file No extra overhead. TCP takes care of error correction. SSH has already encrypted the pipe.