{"title":"反向shell作为获取未经授权访问的工具","authors":"V. Y. Manytsʹkyy","doi":"10.31673/2409-7292.2022.013437","DOIUrl":null,"url":null,"abstract":"This article analyzes the ways and consequences of using a tool such as Reverse Shell in attacks on servers. What is the main danger, what is the scheme of this connection from the \"victim\" to the attacker and what tools are used to prepare for the attack. Basic recommendations on protection and prevention of attacks using the reverse shell are also provided, which include both engineering and technical means of information protection and work with personnel.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Reverse-shell as a tool for gaining unauthorized access\",\"authors\":\"V. Y. Manytsʹkyy\",\"doi\":\"10.31673/2409-7292.2022.013437\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article analyzes the ways and consequences of using a tool such as Reverse Shell in attacks on servers. What is the main danger, what is the scheme of this connection from the \\\"victim\\\" to the attacker and what tools are used to prepare for the attack. Basic recommendations on protection and prevention of attacks using the reverse shell are also provided, which include both engineering and technical means of information protection and work with personnel.\",\"PeriodicalId\":107068,\"journal\":{\"name\":\"Modern information security\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Modern information security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31673/2409-7292.2022.013437\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Modern information security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31673/2409-7292.2022.013437","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Reverse-shell as a tool for gaining unauthorized access
This article analyzes the ways and consequences of using a tool such as Reverse Shell in attacks on servers. What is the main danger, what is the scheme of this connection from the "victim" to the attacker and what tools are used to prepare for the attack. Basic recommendations on protection and prevention of attacks using the reverse shell are also provided, which include both engineering and technical means of information protection and work with personnel.