Offensive Security: Bind and Reverse Shells

preview_player
Показать описание
This video explains what reverse and bind shells are, and why we use each one.

Want to support my channel?

Connect with me on twitter
@TheMattHack_r
Рекомендации по теме
Комментарии
Автор

Great explanation and demonstration! Keep at it king

leongurin
Автор

Very comprehensive and the hands-on approach means we can jump right in and learn something. I subscribed. I hope you make more pentesting videos soon.

shimmeringreflection
Автор

Such a compact and concise video. Thanks😄

kumaravelrajan
Автор

Really clear explanation sir, simple and straight forward =D
Regarding the problem with volume, if your editing software allows it, just boost it up maybe +10db and you can delay upgrading your gear by a little

SuperSohaizai
Автор

the sound quality is not the best, but thanks for the very good explanation!

davidlr
Автор

Perfectly explained thank you so much!

quartzrobot
Автор

Hey man, great video. Quick question though, does this mean that the attack goes both ways? The victim machine could also write commands back? Because the commands for bind and reverse shells are the same, just swapped between the victim and the attacker

WZPanda
Автор

very informative but please try to develop sound quality..

Sharif
Автор

Msfadmin why the sound is so weak? Hopefully it’s an easy fix

Peter-zyox
Автор

hey brother !! this video was very cool !! nice explanation and demos !!
i have a little doubt if you can help me ! what kind of vulnerabilities are there which pop up the reverse shell ?

darkestbrush
Автор

I need to know how to attack back and n the reverse shell. I have been dealing with reverse shell attack since last January. I just need to know how to find him and keep him out for good

constantcrossroads
Автор

I'm all new to linux and the hacking stuff, let me tell you as a brand biggener that you seem like a guy who does know a lot of stuff cuz your explanation was great, still I have to be honnest and tell you that the video could've been beyond great if you had gone deeper into the commands that you used.
Wish you could give us a whole series talking about linux and the file system, root, etc, bin... architecture and what every folder and file mean.

karimkrimou
Автор

Okay, but how to enter the victim machine first in order to make a connection with attacker ? If we want to take a control over the machine we need an access. Without it we can not take the shell control...

pawepachuta
Автор

Yea just got reverse shelled and binded I lost multiple Google accounts and multiple connections to all of my friends so I really need help on how to fix this as fast as you can please

dragonhead
Автор

thanks for the very good explanation mate.. just can you tell me; how can we put the password protection for the bind shell?

umityn
Автор

Why would a victim computer send you a port and give you access to it though?

John-hwzp
Автор

that is a terminal emulator still., the real terminal is the old Pc that doesn't have gui.

daemon
Автор

Not able to hear well. Raise some volume in future videos

shadow_self
Автор

Are you able to make the target a windows machine?

depicgaming
Автор

I spend 1 day to learn about it and failed. you just thought me in less than 6min

ferbgaming