あたりから調子悪悪。ぬー。土曜日は18時に寝て日曜の7時に起床。よう寝ました(^^;
いはらさんとこ書かれていましたが、そんなステキなnetcatがあったとは。サイズもさほど大きくなってないし。
@stakeのほう。
>nc -h
[v1.10 NT]
connect to somewhere: nc [-options] hostname port[s] [ports] ...
listen for inbound: nc -l -p port [options] [hostname] [port]
options:
-d detach from console, stealth mode
-e prog inbound program to exec [dangerous!!]
-g gateway source-routing hop point[s], up to 8
-G num source-routing pointer: 4, 8, 12, ...
-h this cruft
-i secs delay interval for lines sent, ports scanned
-l listen mode, for inbound connects
-L listen harder, re-listen on socket close
-n numeric-only IP addresses, no DNS
-o file hex dump of traffic
-p port local port number
-r randomize local and remote ports
-s addr local source address
-t answer TELNET negotiation
-u UDP mode
-v verbose [use twice to be more verbose]
-w secs timeout for connects and final net reads
-z zero-I/O mode [used for scanning]
port numbers can be individual or ranges: m-n [inclusive]
Forensic Acquisition Utilitiesのほう。
>nc -h
Forensic Acquisition Utilities, 1, 0, 0, 1032
Netcat network data redirector., 1, 11, 1, 1032
Copyright (C) 2002,2003 George M. Garner Jr.
Command Line: nc -h
Based upon Weld Pond's adaptation of Hobbit's netcat 1.00 951010.
Microsoft Windows: Version 5.0 (Build 2195.Professional Service Pack 4)
20/09/2003 23:16:10 (UTC)
Current User: ***
connect to somewhere: nc [-options] hostname port[s] [ports] ...
listen for inbound: nc -l -p port [options] [hostname] [port]
options:
--comp -c [algorithm] compress input or output using the
specified algorithm. (Currently only "md5")
--decomp -x [algorithm] decompress input or output using the
specified algorithm. (Currently only "md5")
--detach -d detach from console, background mode
--hop -g [gateway] source-routing hop point[s], up to 8
--route -G [num] source-routing pointer: 4, 8, 12, ...
--help -h this cruft
--interval -i [millisecs] delay interval for lines sent, ports scanned
--if -I [file] input file (ignored if -l or -L also is specified
--csum -k [alg] compute checksum using the specified algorithm
--lock -K try to lock the input file while it is copied
(currently only md5 supported)
--listen -l listen mode, for inbound connects
--LISTEN -L listen harder, re-listen on socket close
--numeric -n numeric-only IP addresses, no DNS
--of -O [file] output file (-l or -L must also be specified)
--port -p [port] local port number
--random -r randomize local and remote ports
--source -s [addr] local source address
--sparse -S use sparse output file (ignored unless -O also
specified)
--telnet -t answer TELNET negotiation
--udp -u UDP mode
--verbose -v verbose [use twice to be more verbose]
--timeout -w [millisecs] timeout for connects and final net reads
--zero -z zero-I/O mode [used for scanning]
port numbers can be individual or ranges: m-n [inclusive]
Forensic Acquisition Utilities の Examples
nc v n l p 3333 csum md5 --verify sparse O myimage.img.
nc v n csum md5 I \\.\C: 192.168.0.1 3333
nc v n l p 3333 comp zlib O myimage.img.gz.
nc v n I \\.\C: 192.168.0.1 3333
nc v n l p 3333 csum md5 --verify O myimage.img.gz.
nc v n lock csum md5 comp zlib I \\.\D: 192.168.0.1 3333
nc v n l p 3333 csum md5 --verify sparse O myimage.img.
nc v n lock csum md5 I \\?\Volume{87c34910-d826-11d4-987c-00a0b6741049 } 192.168.0.1 3333
ぅぅ。メール差し上げようかと思ったのですが、見つからない(;´Д`)「いちょう」の方のメアドにお送りしてもいいのでしょうか。
楽天の方から送ってみますた。
どうもお手数かけまして。めるる撃ち返しましたです(汁