Sniffing & Spoofingnetworkingnetcattcpudpsslproxysockshttp

ncat-w32

Ncat is a feature-packed networking utility that reads and writes data across networks using TCP and UDP. It serves as a reliable back-end tool for providing network connectivity to applications and users.

Description

Ncat-w32 is a Windows version of Ncat, the modern reimplementation of Netcat developed for the Nmap Project. It supports both IPv4 and IPv6, making it versatile for various networking tasks. The tool is designed to instantly add network connectivity to software that lacks native support.

Among its extensive features, Ncat-w32 can chain multiple Ncat instances together, redirect TCP and UDP ports to other sites, provide SSL encryption, and support proxy connections through SOCKS4 or HTTP (CONNECT method) proxies with optional authentication. These capabilities make it suitable for tunneling, port forwarding, and creating flexible network connections.

The tool follows general networking principles applicable to most applications, enabling rapid deployment in testing, development, and security assessment scenarios. Located at /usr/share/windows-resources/ncat/ncat.exe, it provides Windows-compatible functionality within Kali Linux environments.

How It Works

Ncat-w32 operates as a command-line networking tool using TCP and UDP protocols for bidirectional data transfer across IPv4 and IPv6 networks. It functions as a backend by listening on ports, connecting to remote hosts, or chaining connections. SSL support encrypts traffic, while proxy features route connections through SOCKS4 or HTTP proxies using the CONNECT method with authentication. Port redirection and chaining enable complex network topologies by relaying data between multiple endpoints.

Installation

bash
sudo apt install ncat-w32

Flags

-hDisplay help information for ncat-w32

Examples

Shows the help menu displaying usage information for the tool
ncat-w32 -h
Listen on TCP port 8080 for incoming connections
ncat-w32 -l 8080
Connect to example.com on port 80 using TCP
ncat-w32 example.com 80
Listen on UDP port 1234 for incoming datagrams
ncat-w32 -l -u 1234
Listen on SSL-encrypted TCP port 443
ncat-w32 --ssl -l 443
Connect to target.com:80 through SOCKS proxy at proxy.example.com:1080
ncat-w32 -x proxy.example.com:1080 target.com 80
Connect through HTTP proxy with authentication
ncat-w32 --proxy-type http --proxy-auth user:pass proxy:8080 target:80
Updated 2026-04-16kali.org ↗