Reverse shell and Bind shell using netcat.
Revers shell using net cat A shell is a user interface for access to operating system services. A reverse shell is a remote shell, where the connection is made from the system that offers the client services that want to use these services. Attackers can also use web shells instead of reverse shells. using Netcat reverse shell there are two systems included one is the attacker and one is the target system. there is one system is the initiator and the second system is the listener. there is mostly two types of reverse shell 1)Bind shell (when target is listening) //drawback work like a chatbox you can't exploit target 2)reverse shell (when an attacker is listening) //using reverse shell you can exploit the target The command for the shell execution: c ommand architecture: >nc (netcat) IP (attackers machine IP) port no. (attacker and victim machine). BindShell: the victim is listening on a particular port no.