Socat – Netcat on steroids

Switchboard

Article from Issue 287/2024
Author(s):

Netcat is the Swiss Army knife of networking for admins. Socat takes this principle one step further, offering multiplexing, TLS-secured channels, pipes, Unix sockets, and executables.

Netcat is undoubtedly a useful tool for testing TCP connections or UDP ports, transferring files, and far more [1]. Socat [2] offers even more: Besides raw TCP and UDP connections, it supports channels secured by TLS and can access pipes, Unix sockets, and executables. As if that were not enough, it can also multiplex multiple client connections.

Just like Netcat, Socat expects two position parameters to establish a connection between two network addresses: socat <address1> <address2>. It can make sense to transfer files via raw TCP connections, for example, if you need to work as a different user on the target system than on the source. On many of the systems I support, sudo I/O logging is enabled.

This means that for SCP or SFTP transfers with a user change (Listing 1), the complete transfer is added to the sudo logs via stdin and stdout. This can mean several gigabytes of data need to be stored in the /var/log/sudo/ directory. If you don't want to do without additional security via public key authentication and deactivated root accounts, you have to come up with something smart for transfers of this type. This is where Netcat and Socat come into play.

[...]

Use Express-Checkout link below to read the full article (PDF).

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • Reverse Shells

    Firewalls block shell access from outside the network. But what if the shell is launched from the inside?

  • KOReader E-reader

    KOReader offers enough features to give your humble ebook reader new powers and completely transform your reading experience.

  • DIY Web Server

    If you want to learn a little bit more about the communication between a web browser and an HTTP server, why not build your own web server and take a closer look.

  • Digital Forensics and Incident Response

    When it's too late to stop an attack, the next urgent task is to find out what happened and assess the damage.

  • Backdoors

    Backdoors give attackers unrestricted access to a zombie system. If you plan to stop the bad guys from settling in, you’ll be interested in this analysis of the tools they might use for building a private entrance.

comments powered by Disqus
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News