First you need to load the function before you can execute it. Pretty simple, like others powershell functions: TCP Listener to DNS Client Relay using the Windows Default DNS Server You can also relay data between connections of different protocols. Relays in powercat work just like traditional netcat relays, but you don't have to create a file or start a second process. Generate a bind tcp encoded command which listens on port 8000:Īnd allows to create network relays without start a second process: Generate a reverse tcp payload which connects back to 10.1.1.15 port 443: You can use these if you don't want to use all of powercat. Encoded payloads can be executed with powershell -E. Payloads which do a specific action can be generated using -g (Generate Payload) and -ge (Generate Encoded Payload). However the developer has added some additional features focused on penetration testing.įor example, Powercat is able to create simple payloads: o Console Output Type: "Host", "Bytes", or "String"
i Input: Filepath (string), byte array, or string. The command parameters are pretty similar of 'official' Netcat: -l Listen for a connection. On this GitHub repository i've found an interesting porting of Netcat developed using Powershell. It's an open source UNIX utility written in C (but also available on a great number of OSs) for performing network related tasks, really useful during network discovery/troubleshooting, but also during penetration tests.
Netcat is a "venerable"network tool, dubbed "the TCP/IP swiss army knife".