Skip to Content
Hands-On Red Team Tactics
book

Hands-On Red Team Tactics

by Himanshu Sharma, Harpreet Singh
September 2018
Intermediate to advanced
480 pages
9h 45m
English
Packt Publishing
Content preview from Hands-On Red Team Tactics

./ReverseShell

In this chapter, we will focus on getting a reverse connection from an exploited system. We will also cover different methods for getting a secure reverse connection, explaining the difference between a non-encrypted and encrypted channel by showing the noise level it creates in the network using tcpdump for packet-level analysis.

When penetration testing, it is common to encounter the issue of getting a shell. In this case, individuals either upload a web shell on the target site and interact with the server or they execute a command to get the reverse connection. In both cases, if the scope of testing includes internal network recon, then reverse shell connection is a must.

For beginners, getting a reverse shell is very interesting. ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Storytelling with You

Storytelling with You

Cole Nussbaumer Knaflic
The Manager's Path

The Manager's Path

Camille Fournier
Crucial Conversations

Crucial Conversations

Joseph Grenny, Kerry Patterson, Ron McMillan, Al Switzler, Emily Gregory

Publisher Resources

ISBN: 9781788995238Other