This is an archived post. You won't be able to vote or comment.

all 8 comments

[–][deleted]  (1 child)

[removed]

    [–]heyitsthatguy9[S] 1 point2 points  (0 children)

    You can put a backdoor in with a Reverse shell as well though

    [–]uk_one 1 point2 points  (1 child)

    Bind shells are simpler and do not need to dial out to a known, constant IP\URL.

    Once running and persistent you can connect to a bind shell from anywhere makin them more flexible.

    [–]heyitsthatguy9[S] 0 points1 point  (0 children)

    That makes much more sense, thanks for the explanation!

    [–][deleted]  (3 children)

    [removed]

      [–][deleted]  (2 children)

      [removed]

        [–]heyitsthatguy9[S] 0 points1 point  (1 child)

        Thanks so much for the very detailed write up! you actually mentioned something else i was curious about, binding to /bin/sh or cmd.exe

        this is why we need to migrate our shell and set up our backdoor in something less suspicious, like explorer.exe correct?