{"title":"Reverse-shell as a tool for gaining unauthorized access","authors":"V. Y. Manytsʹkyy","doi":"10.31673/2409-7292.2022.013437","DOIUrl":null,"url":null,"abstract":"This article analyzes the ways and consequences of using a tool such as Reverse Shell in attacks on servers. What is the main danger, what is the scheme of this connection from the \"victim\" to the attacker and what tools are used to prepare for the attack. Basic recommendations on protection and prevention of attacks using the reverse shell are also provided, which include both engineering and technical means of information protection and work with personnel.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Modern information security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31673/2409-7292.2022.013437","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This article analyzes the ways and consequences of using a tool such as Reverse Shell in attacks on servers. What is the main danger, what is the scheme of this connection from the "victim" to the attacker and what tools are used to prepare for the attack. Basic recommendations on protection and prevention of attacks using the reverse shell are also provided, which include both engineering and technical means of information protection and work with personnel.