Manglani et al., 2021 - Google Patents
Optimized Reverse TCP Shell Using One-Time Persistent ConnectionManglani et al., 2021
View PDF- Document ID
- 4996270648742125755
- Author
- Manglani A
- Desai T
- Shah P
- Ukani V
- Publication year
- Publication venue
- Innovations in Information and Communication Technologies (IICT-2020) Proceedings of International Conference on ICRIHE-2020, Delhi, India: IICT-2020
External Links
Snippet
Reverse shell has now emerged as an effective tool used to penetrate systems and networks with speed and compromise them. The efficiency and robustness of reverse shell lie in its use of the victim's machine to generate the connection request to the attacker …
- 230000002085 persistent 0 title abstract description 6
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12003485B2 (en) | Outbound/inbound lateral traffic punting based on process risk | |
US10855656B2 (en) | Fine-grained firewall policy enforcement using session app ID and endpoint process ID correlation | |
Yu et al. | PSI: Precise Security Instrumentation for Enterprise Networks. | |
US9491142B2 (en) | Malware analysis system | |
US11861008B2 (en) | Using browser context in evasive web-based malware detection | |
Sood et al. | An empirical study of HTTP-based financial botnets | |
Qbeitah et al. | Dynamic malware analysis of phishing emails | |
Victor et al. | IoT malware: An attribute-based taxonomy, detection mechanisms and challenges | |
CN111295640B (en) | Fine-grained firewall policy enforcement using session App ID and endpoint process ID correlation | |
Eustis | The Mirai Botnet and the importance of IoT device security | |
Sharp | An introduction to malware | |
Imamura et al. | Web access monitoring mechanism via Android WebView for threat analysis | |
Manglani et al. | Optimized Reverse TCP Shell Using One-Time Persistent Connection | |
US9705898B2 (en) | Applying group policies | |
JP2024023875A (en) | Inline malware detection | |
Bansal et al. | Analysis and Detection of various DDoS attacks on Internet of Things Network | |
Choi et al. | A study on analysis of malicious code behavior information for predicting security threats in new environments | |
Badhwar | Commentary on Insider Threat | |
Kalil | Policy Creation and Bootstrapping System for Customer Edge Switching | |
Jamuradovich | SEARCHING FOR WAYS TO IMPROVE THE EFFECTIVENESS OF TOOLS FOR DETECTING INFECTED FILES OF COMPUTER SYSTEMS | |
Honnavalli B et al. | Comparative Analysis of Botnet and Ransomware for Early Detection | |
Xiong et al. | Experimental Design of Intranet Penetration for Anti Anti-Virus Traffic Characterization | |
Clay | Cybersecurity | |
Mohanta et al. | Network Communication | |
Kothari et al. | Static Analysis of Android Permissions and SMS using Machine Learning Algorithms |