ncat Send and Receive Only

This week, I picked up the ncat series again and looked at broker mode for transferring files. In my example case, the file was just ASCII and was simple to examine to ensure that no stray bits of the transmission were accidentally stored in the outputfile. But what if the file had been an executable? Using the --recv-only and/or --send-only options ensures that a client or server doesn’t interject any stray packets into the network stream....

2016-11-12 · 1 min · Jon Mark Allen

Using ncat in Broker Mode

I was looking through the various options for ncat and came across an option I hadn’t seen before: Broker mode. After reading through the examples, I learned that the --chat mode is really just a special mode of connection brokering. In ncat, “brokering” a connection allows multiple connections to the same listening instance, and takes the input from one connection and send it as output to all the other connections. The ncat chat server adds labels to who said what to help keep the confusion down, but in every other way, it is simply a brokered connection....

2016-11-09 · 3 min · Jon Mark Allen

How to Use miniLock - a Simple Way to Encrypt Files

I originally posted this entry on our family’s Wordpress blog, back in 2015. I decided to update and repost the content here, since it’s still relevant and it fits better here anyway… miniLock is no longer actively maintained and is no longer recommended as an encrypton option. There are lots of different ways to encrypt a file and today I want to cover one of the more obscure, and I believe more unique methods....

2016-04-22 · 3 min · Jon Mark Allen

Donkeys and KPIs

I originally posted this entry on our family’s Wordpress blog, back in 2013. I decided to repost here, since it’s still relevant and fits better here anyway… Recently, the NSA declassified 136 issues of their monthly internal publication, “Cryptolog”, and released them in PDF versions for public consumption. (alternate Cryptome archive) As a geek this was/is very exciting for me. Without a great deal of time to read through them, I decided to briefly peruse the edition published the month I was born (Volume V, No 3 – Yes I’m a young whippersnapper) and quickly moved to the article entitled “I had ‘Animal Crackers in my soup,’ but you’ve got a donkey in your WHAT?...

2016-04-13 · 2 min · Jon Mark Allen

Restricting Connections to ncat

We’ve already seen the usefulness of ncat, including ncat SSL sessions and running chat servers. Now we address the potential issue of unintended users of our listening ncat sessions. Why would you want to limit access to an ncat listener? If you’re competing in a Capture the Flag event and you’ve managed to establish an ncat listener, it would be no good to take a host you worked so hard to gain and gice it away to the other competitors....

2016-04-08 · 2 min · Jon Mark Allen