Lines Matching +full:port +full:- +full:specific

15 .\"    derived from this software without specific prior written permission
38 .Bk -words
43 .Op Fl -no-tcpopt
44 .Op Fl -sctp
45 .Op Fl -crlf
51 .Op Fl -tun Ar tundev
57 .Ar port Oc
60 .Op Ar port
69 .Ux Ns -domain
72 TCP and UDP ports, do port scanning, and deal with both IPv4 and
84 .Bl -bullet -offset indent -compact
88 shell-script based HTTP clients and servers
99 .Bl -tag -width Ds
108 .It Fl -crlf
117 .Li "-e 'in ipsec esp/transport//require'"
118 .Li "-e 'out ipsec esp/transport//require'"
179 Collect per-connection TCP statistics using the
191 .It Fl -no-tcpopt
195 .It Fl -sctp
204 Specifies the source port
219 .Ux Ns -domain
247 .It Fl -tun Ar tundev
255 .Ux Ns -domain
260 .Ux Ns -domain
263 .Ux Ns -domain
306 .Ar port Oc
315 .Ar port .
317 .Ar port
318 is not specified, the well-known port for the proxy protocol is used (1080
340 .Ux Ns -domain
346 .Ar port
348 Ranges are in the form nn-mm.
350 a destination port must be specified,
359 listening on a specific port for a connection.
362 .Dl $ nc -l 1234
365 is now listening on port 1234 for a connection.
368 connect to the machine and port being listened on:
374 and vice-versa.
393 to listen on a specific port, with output captured into a file:
395 .Dl $ nc -l 1234 \*(Gt filename.out
401 .Dl $ nc -N host.example.com 1234 \*(Lt filename.in
412 .Bd -literal -offset indent
424 .Bd -literal -offset indent
435 .Sh PORT SCANNING
445 .Bd -literal -offset indent
446 $ nc -z host.example.com 20-30
447 Connection to host.example.com 22 port [tcp/ssh] succeeded!
448 Connection to host.example.com 25 port [tcp/smtp] succeeded!
451 The port range was specified to limit the search to ports 20 \- 30.
463 .Bd -literal -offset indent
464 $ echo "QUIT" | nc host.example.com 20-30
465 SSH-1.99-OpenSSH_3.6.1p2
470 Open a TCP connection to port 42 of host.example.com, using port 31337 as
471 the source port, with a timeout of 5 seconds:
473 .Dl $ nc -p 31337 -w 5 host.example.com 42
475 Open a UDP connection to port 53 of host.example.com:
477 .Dl $ nc -u host.example.com 53
479 Open a TCP connection to port 42 of host.example.com using 10.1.2.3 as the
482 .Dl $ nc -s 10.1.2.3 host.example.com 42
484 Open a TCP connection to port 42 of host.example.com using IPsec ESP for
487 .Dl $ nc -E host.example.com 42
489 Open a TCP connection to port 42 of host.example.com using IPsec ESP for
492 .Dl $ nc -e 'out ipsec esp/transport//require' host.example.com 42
495 .Ux Ns -domain
498 .Dl $ nc -lU /var/tmp/dsocket
500 Connect to port 42 of host.example.com via an HTTP proxy at 10.2.3.4,
501 port 8080.
510 .Dl $ nc -x10.2.3.4:8080 -Xconnect host.example.com 42
516 .Dl $ nc -x10.2.3.4:8080 -Xconnect -Pruser host.example.com 42
518 .Ex -std
531 UDP port scans using the