On Sun, Aug 29, 2010 at 11:30 AM, Yuva raj <[email protected]> wrote:
> > > > Can anybody please brief me about Reverse shell? (When I am > googling; > > > it’s > > > > confusing me instead to help.) > > > > 1. What is reverse shell? > > > connecting in a reverse way than normal is called reverse shell. > while installing trojan , server part will be installed on victims computer > and client will be installed in cracker machine(Traditional Client Server > way way ). > in the above method if the client is behind nat or firewall its tough to > make a connection. > The client will open a port and listen for the connection from cracker. a > simple netsat -n will reveal that and those connections can easily blocked > by firewall and routers . > > Lets Come to Reverse Shell. > In this method server will be installed on cracker machine and client will > be installed on the victim machine. once the the client installed it will > try to communicate with the crackers machine server and opens an session. > Reverse shell is less reliable than the traditional way but it will blasts > away most of the firewall and NAT . > > Reverse shell is boon to crackers ;) > > > > 2. Is it mostly used for hacking rather pentest? > > > according to me if you only hack then only you are a penetration tester. > > > > > 3. how to identify / what are the precautions we need to take? (From > > the > > > > system administration perspective.) > > > Path and upgrade you application and OS . install an IDS . > > > > > Thanks. > > > > Hi YuvaRaj, Thanks a lot. _______________________________________________ ILUGC Mailing List: http://www.ae.iitm.ac.in/mailman/listinfo/ilugc
