I know that reverse shell lets victim connects to us but i heard that people mostly use reverse shell ,why to use reverse shell while hacking the nework outside our local network as we have to do port forwarding?it only brings some extra work
Forum Thread: Why to Use Reverse Shell?
- Hot
- Active
-
Forum Thread: Ext4 File System Error While Installing Kali Linux for Bootable Usb 3 Replies
10 hrs ago -
Forum Thread: Eml to PST Conversion 3 Replies
10 hrs ago -
Forum Thread: PORT FORWARDING IN JIOFI 18 Replies
1 day ago -
Forum Thread: How to Install Kali Linux on Iphone or Ipad 24 Replies
1 day ago -
Forum Thread: How to Hack CCTV Private Cameras 65 Replies
1 day ago -
Forum Thread: Hack Instagram Account Using BruteForce 197 Replies
2 days ago -
Forum Thread: How to Hack a Website to Edit It 19 Replies
1 wk ago -
Forum Thread: Android Doesn't Connect Back to Metasploit with App Payload? 18 Replies
1 wk ago -
Forum Thread: Hacking Facebook,Twitter,Instagram Account Passwords with BruteForce 156 Replies
1 wk ago -
Forum Thread: Kali Linux WiFi Problem? 41 Replies
1 wk ago -
How to: HACK Android Device with TermuX on Android | Part #1 - Over the Internet [Ultimate Guide] 173 Replies
1 wk ago -
Forum Thread: How to Start Listening Connections on Metaslpoit (WINDOWS) 8 Replies
1 wk ago -
Forum Thread: Grab Target's Webcam by Link 4 Replies
1 wk ago -
How to: HACK Android Device with TermuX on Android | Part #2 - Over WLAN Hotspot [Ultimate Guide] 24 Replies
1 wk ago -
Forum Thread: Complete Guide to Creating and Hosting a Phishing Page for Beginners 41 Replies
2 wks ago -
Forum Thread: No Wireless Extensions in Linux Debian 3 Replies
2 wks ago -
How to: Sign the APK File with Embedded Payload (The Ultimate Guide) 6 Replies
2 wks ago -
Forum Thread: Bruteforce Password Cracker (ghoster_brute) 6 Replies
3 wks ago -
Forum Thread: Txpower Adjustment? 17 Replies
3 wks ago -
Forum Thread: How to Controll Multiple Devices Using a Meterpreter ? 4 Replies
3 wks ago
-
How To: Use RedRabbit for Pen-Testing & Post-Exploitation of Windows Machines
-
How To: Top 10 Things to Do After Installing Kali Linux
-
How To: Hack Android Using Kali (Remotely)
-
How To: Boost Your Security with a VPN & Private Email Service
-
How To: Null Byte's Hacker Guide to Buying an ESP32 Camera Module That's Right for Your Project
-
How to Hack Wi-Fi: Cracking WPA2 Passwords Using the New PMKID Hashcat Attack
-
How To: Brute-Force Nearly Any Website Login with Hatch
-
How To: The Hacks Behind Cracking, Part 1: How to Bypass Software Registration
-
Hacking Windows 10: How to Dump NTLM Hashes & Crack Windows Passwords
-
How To: Buy the Best Wireless Network Adapter for Wi-Fi Hacking in 2019
-
How To: Crack Password-Protected ZIP Files, PDFs & More with Zydra
-
How To: 4 Ways to Crack a Facebook Password & How to Protect Yourself from Them
-
How to Hack Wi-Fi: Stealing Wi-Fi Passwords with an Evil Twin Attack
-
Hack Like a Pro: How to Crack Passwords, Part 4 (Creating a Custom Wordlist with Crunch)
-
How To: Create a Persistent Back Door in Android Using Kali Linux:
-
How To: Crack Any Master Combination Lock in 8 Tries or Less Using This Calculator
-
How To: Phish for Social Media & Other Account Passwords with BlackEye
-
How To: Perform Keystroke Injection Attacks Over Wi-Fi with Your Smartphone
-
How to Hack Wi-Fi: Cracking WPA2-PSK Passwords Using Aircrack-Ng
-
How To: Crack Shadow Hashes After Getting Root on a Linux System
1 Response
Mostly for two reasons:
A) Connectivity. We can port forward our router, but not the targets - meaning that if we're both behind NAT, as is likely, we have to use a reverse shell because it's the only way to interact with the target - as we can't contact any bind shells.
B) Stealth. Egress (outbound) filtering is less intense than ingress (inbound) filtering due to overuse of bind shells in the past. As a result, a backdoor with a reverse shell is analyzed less aggressively, and requires fewer privileges, than a comparable bind shell.
It is also important to note that port forwarding is NOT the only way an attacker can direct a reverse shell to their machine - services such as ngrok allow port forwarding without mucking in router settings (I use it religiously when I deal with WAN), or a directly-connected, public-IP server (such as an AWS or DigitalOcean server) can function as a Command-and-Control (C2) server, to which the attacker can connect to interact with any reverse shells it has accumulated. Both of these options also include, by their very nature, a (small) extra layer of stealth - as you invoke a proxy in either case - which is always nice.
Share Your Thoughts