A reverse shell is a payload, typically expressed as shellcode, that connects to a listener hosted on a machine controlled by the attacker. Conversely, with bind shells, the listener is established on the victim host, requiring the attacker to subsequently connect to the victim in order to use the shell.
Links to this note
- attackers gaining shells
- bindshell
- hackingteamwriteup-fisher2016
- Jynx rootkit
- nc -e
- Netcat
- netcat reverse shells
- Perl reverse shell
- port knocking
- reverse shell cheat sheet
- simple shells running under netcat or a basic socket program/script have a suboptimal user experience
- socat tty listener
- stealthshell-petrich2024
- upgradingpty-ropnop2017
- vanilla reverse shell