Reverse Shell Stabilisation
Below is one example of how to stabilise a reverse-shell. What are the benefits of a reverse-shell: Makes using text…
Coder, Hacker, SysAd & Forensic Investigator
A blog from a forensic investigator, ethical hacker and programmer
The network category covers a huge plethora of topics; from the OSI 7 model, IP and CIDR formats, down to scanning host machines, port scanning and denial of service attacks. Where possible I’ve also tagged networking categorised articles into various protocols, such as the main Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP). Equally some articles will be tagged for which layer of the Open Systems Interconnection 7 model they belong to; application, presentation, session, transport, network, data link or physical.