7 REVERSE SHELLS

You’ve practiced gaining initial access to a target by establishing web shells that provide temporary, one-way network channels. In this chapter, we’ll explore a more stable initial access technique: using reverse shells, which swap the direction of the network communication. Attackers use these reverse connections from a compromised target machine to their own machine to gain reliable control over the compromised system and execute commands remotely in a more synchronized fashion.

You’ll learn how to create a reverse shell, then make your communications with remote environments more robust. As a bonus, you’ll also learn ...

Get Black Hat Bash now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.