Running code on attacker machine from a reverse ssh exploit? (Low level theoretical explanation required)

Reverse shell. A victim server runs a malicious binary which creates an SSH connection to the attacker machine. Then the attacker machine SSH’s to the victim server and runs commands (that way you bypass the firewall and closed ports). Tha… Continue reading Running code on attacker machine from a reverse ssh exploit? (Low level theoretical explanation required)