<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Shell on 0x0d1n's Blog</title><link>https://kevinschmidt.ch/categories/shell/</link><description>Recent content in Shell on 0x0d1n's Blog</description><generator>Hugo</generator><language>en-us</language><copyright>0x0d1n</copyright><lastBuildDate>Thu, 20 May 2021 00:00:00 +0000</lastBuildDate><atom:link href="https://kevinschmidt.ch/categories/shell/index.xml" rel="self" type="application/rss+xml"/><item><title>[Random] Reverse Shell &amp; TTY Upgrade</title><link>https://kevinschmidt.ch/posts/2/</link><pubDate>Thu, 20 May 2021 00:00:00 +0000</pubDate><guid>https://kevinschmidt.ch/posts/2/</guid><description>&lt;h2 id="reverse-shell"&gt;Reverse shell&lt;/h2&gt;
&lt;p&gt;Reverse shells will allow users to get a foothold into the network of an already compromised target with the help of a shell session (remotely). This means that the target will initiate a connection to the attacker’s workstation that is already listening/waiting for it at a specific port (often a port higher than 1024). The connection will establish a shell session with the attacker and the target thus allowing the hacker to send commands to the target and retrieve its results like a normal shell.&lt;/p&gt;</description></item></channel></rss>