Welcome back, everybody. In the previous article, we covered the ideas and concepts of well-known ports and trust exploitation in order to evade a firewall. Today, we’ll be building the shell, the part that receives commands, executes them, and sends the output back to the attacker.

This portion of our shell is relatively simple, but we still have something we need to cover before we jump in. We’ll be using UDP as the transport protocol for moving our commands and output in and out of the shell. This is actually important, so let’s explain in a bit more detail.

Using UDP as the Transport… more

Go to Source


Comments are closed.