Establishing a reverse shell without any software tools like Netcat (by the server)

Has it ever happened or is it possible that just by configuring custom code on the attacker’s listener like with Python or any other programming language, if a victim just connects to it using TCP, a reverse shell can happen without the vi… Continue reading Establishing a reverse shell without any software tools like Netcat (by the server)

Running code on attacker machine from a reverse ssh exploit? (Low level theoretical explanation required)

Reverse shell. A victim server runs a malicious binary which creates an SSH connection to the attacker machine. Then the attacker machine SSH’s to the victim server and runs commands (that way you bypass the firewall and closed ports). Tha… Continue reading Running code on attacker machine from a reverse ssh exploit? (Low level theoretical explanation required)