Hello Guys. In this post, I would explain to you about Netcat relay which has very little video presentation on how it is done especially for penetration testing purpose. So I have done a simple video illustrating how in a penetration testing process, you may use Netcat relay to achieve something which is useful.
Netcat Relay
In this video, the scenario would be like below;
1) There will be three machines in this tutorial.
- Windows Machine (Hacker's Machine)
- Kali Linux Machine (A machine assuming in the DMZ environment of the target network)
- Ubuntu Machine (A machine which is in the same network as DMZ but not accessible by the Hacker's machine)