[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Manglani et al., 2021 - Google Patents

Optimized Reverse TCP Shell Using One-Time Persistent Connection

Manglani et al., 2021

View PDF
Document ID
4996270648742125755
Author
Manglani A
Desai T
Shah P
Ukani V
Publication year
Publication venue
Innovations in Information and Communication Technologies (IICT-2020) Proceedings of International Conference on ICRIHE-2020, Delhi, India: IICT-2020

External Links

Snippet

Reverse shell has now emerged as an effective tool used to penetrate systems and networks with speed and compromise them. The efficiency and robustness of reverse shell lie in its use of the victim's machine to generate the connection request to the attacker …
Continue reading at www.researchgate.net (PDF) (other versions)

Similar Documents

Publication Publication Date Title
US12003485B2 (en) Outbound/inbound lateral traffic punting based on process risk
US10855656B2 (en) Fine-grained firewall policy enforcement using session app ID and endpoint process ID correlation
Yu et al. PSI: Precise Security Instrumentation for Enterprise Networks.
US9491142B2 (en) Malware analysis system
US11861008B2 (en) Using browser context in evasive web-based malware detection
Sood et al. An empirical study of HTTP-based financial botnets
Qbeitah et al. Dynamic malware analysis of phishing emails
Victor et al. IoT malware: An attribute-based taxonomy, detection mechanisms and challenges
CN111295640B (en) Fine-grained firewall policy enforcement using session App ID and endpoint process ID correlation
Eustis The Mirai Botnet and the importance of IoT device security
Sharp An introduction to malware
Imamura et al. Web access monitoring mechanism via Android WebView for threat analysis
Manglani et al. Optimized Reverse TCP Shell Using One-Time Persistent Connection
US9705898B2 (en) Applying group policies
JP2024023875A (en) Inline malware detection
Bansal et al. Analysis and Detection of various DDoS attacks on Internet of Things Network
Choi et al. A study on analysis of malicious code behavior information for predicting security threats in new environments
Badhwar Commentary on Insider Threat
Kalil Policy Creation and Bootstrapping System for Customer Edge Switching
Jamuradovich SEARCHING FOR WAYS TO IMPROVE THE EFFECTIVENESS OF TOOLS FOR DETECTING INFECTED FILES OF COMPUTER SYSTEMS
Honnavalli B et al. Comparative Analysis of Botnet and Ransomware for Early Detection
Xiong et al. Experimental Design of Intranet Penetration for Anti Anti-Virus Traffic Characterization
Clay Cybersecurity
Mohanta et al. Network Communication
Kothari et al. Static Analysis of Android Permissions and SMS using Machine Learning Algorithms