93

Is there a way to quickly bind to a TCP port/ip address and simply print out all information to STDOUT? I have a simple debugging solution which writes things to 127.0.0.1:4444 and I'd like to be able to simply bind up a port from bash and print everything that comes across. Is there an easy way to do this?

Naftuli Kay
  • 87,710
  • 93
  • 269
  • 411

4 Answers4

130
$ nc -k -l 4444 > filename.out

see nc(1)

Nikolai Fetissov
  • 82,306
  • 11
  • 110
  • 171
  • 4
    Any way to do it that doesn't require it to run in a loop, ie bind until killed? I'm repeatedly connecting and disconnecting to the socket and `nc` dies if I don't run it like this: `while true; do nc -l 4444; done`. – Naftuli Kay Jan 19 '11 at 18:43
  • On some distros you'll need to change it to 'nc -k -l -p 4444'. – Rostislav Matl Apr 09 '15 at 11:38
  • 2
    If you use ncat instead of nc, you can have multiple concurrent connections while using the exact same syntax. – Sietse van der Molen Sep 14 '15 at 02:56
  • 2
    yes, use `ncat` instead of `nc` (it comes bundled with `nmap` and it's a modern day incarnation of `nc`) – Freedom_Ben Jul 07 '16 at 18:06
62

Just because you asked how to do it in bash, though netcat answer is very valid:

  $ exec 3<>/dev/tcp/127.0.0.1/4444
  $ cat <&3
Diego Torres Milano
  • 65,697
  • 9
  • 111
  • 134
18

That is working as you expecting:

 nc -k -l 4444 |bash

and then you

echo "ls" >/dev/tcp/127.0.0.1/4444

then you see the listing performed by bash.

[A Brief Security Warning]
Of course if you leave a thing like this running on your computer, you have a wide open gateway for all kinds of attacks because commands can be sent from any user account on any host in your network. This implements no security (authentication, identification) whatsoever and sends all transmitted commands unencrypted over the network, so it can very easily be abused.

Alfe
  • 56,346
  • 20
  • 107
  • 159
luk
  • 181
  • 1
  • 2
  • 2
    If you don't have `/dev/tcp`, you can run: `echo "ls" | nc 127.0.0.1 4444` – fzbd Jul 04 '18 at 20:15
  • 1
    @fzbd: there is no /dev/tcp. this is special bash file, so ``ls`` will not show this – Marcin Fabrykowski Oct 11 '18 at 14:32
  • @MarcinFabrykowski Correct, but if you run these commands on other shells, there is no handler available. It can also fail if your bash isn't compiled with `--enable-net-redirections`. – fzbd Oct 12 '18 at 08:02
9

Adding an answer using ncat that @Freedom_Ben alluded to:

ncat -k -l 127.0.0.1 4444

and explanation of options from man ncat:

-k, --keep-open            Accept multiple connections in listen mode
-l, --listen               Bind and listen for incoming connections
Kilokahn
  • 2,281
  • 1
  • 25
  • 50