Dear All, Can anybody please brief me about Reverse shell? (When I am googling; it’s confusing me instead to help.) 1. What is reverse shell? 2. Is it mostly used for hacking rather pentest? 3. how to identify / what are the precautions we need to take? (From the system administration perspective.) Thanks.
Regards, *Siva Prakash.SK* +91-99406-94946. http://www.linkedin.com/in/sivaox _______________________________________________ ILUGC Mailing List: http://www.ae.iitm.ac.in/mailman/listinfo/ilugc
