(Difference between pages)
imported>ThorstenStaerk |
imported>ThorstenStaerk |
Line 1: |
Line 1: |
− | netcat lets you stream data over a [[network]] connection. This has several usecases:
| + | #REDIRECT [[FRITZ!Box 7312]] |
− | | |
− | = hard drive cloning =
| |
− | Let's say you have two machines of similar configuration and you want to [[clone]] the hard drive of one over to the other; you want to copy the "template" machine to a "target" machine. Given that both machines are online and the '''target''' machine has an IP of 192.168.1.2 you can do this:
| |
− | | |
− | On the target machine
| |
− | <source>
| |
− | $ nc -l -p 8000 | dd of=/dev/hda1
| |
− | </source>
| |
− | ;''The target machine is now listening on port 8000. Anything it receives it will write to the first partition of the first drive (hda1)''.
| |
− | | |
− | On the template machine
| |
− | <source>
| |
− | $ dd if=/dev/hda1 | nc 192.168.1.2 8000
| |
− | </source>
| |
− | ;''The first partition of the template machine is read and piped to netcat, which sends it to the IP address and correct port of the target machine.''
| |
− | | |
− | If you use this technique don't forget the [http://wiki.linuxquestions.org/wiki/MBR Master Boot Record]. You can copy it with:
| |
− | <source>
| |
− | $ dd if=/dev/hda bs=446 count=1
| |
− | </source>
| |
− | | |
− | = snmp monitoring with UDP =
| |
− | You can also monitor network traffic by using netcat as data consumer. To listen to [[snmp]]'s trap communication via UDP set up a SNMP trap receiver using
| |
− | netcat <abbr title="UDP">-u</abbr> <abbr title="listen">-l</abbr> <abbr title="SNMP trap port number">162</abbr> | hexdump -C
| |
− | | |
− | | |
− | = See also =
| |
− | * [[nmap]]
| |
− | * [[tcpdump]]
| |
− | * [[netstat]]
| |
− | | |
− | [[Category:Networking]]
| |
− | [[Category:Command]]
| |
Latest revision as of 15:34, 20 July 2012