Dear All,

Can anybody please brief me about Reverse shell?  (When I am googling; it’s
confusing me instead to help.)
1. What is reverse shell?
2. Is it mostly used for hacking rather pentest?
3. how to identify / what are the precautions we need to take? (From the
system administration perspective.)
Thanks.

Regards,
*Siva Prakash.SK*
+91-99406-94946.
http://www.linkedin.com/in/sivaox
_______________________________________________
ILUGC Mailing List:
http://www.ae.iitm.ac.in/mailman/listinfo/ilugc

Reply via email to