September 2021
Intermediate to advanced
376 pages
9h 25m
English
The cause is hidden. The effect is visible to all.
–Ovid

So, you’ve intercepted a victim’s traffic. Let’s say you discovered that the victim works at a particular company. You decide to break into the company’s server and upload a program called a reverse shell that allows you to remotely execute commands on that server. The reverse shell lets you maintain access to the server even after the company fixes the vulnerability that let you gain access in the first place. This chapter explains how attackers do this and shows you how to execute this attack yourself. I’ll begin by explaining the fundamentals of socket ...