Dec. 7, 2023, 2:17 p.m. | Tushar Subhra Dutta

Cyber Security News cybersecuritynews.com

Hackers exploit reverse TCP shells on Linux or Unix systems to gain unauthorized remote access. This enables them to do the following illicit activities by exploiting vulnerabilities while masking their identity and location:- Cybersecurity researchers at PwC recently discovered a reverse TCP shell for Linux or Unix systems with C2 capabilities while analyzing one of […]


The post SnappyTCP – Reverse Shell for Linux/Unix Systems With C2 Capabilities appeared first on Cyber Security News.

access capabilities cyber security cybersecurity exploit exploiting hackers identity linux location malware masking pwc remote access researchers reverse reverse shell shell shells systems tcp unix vulnerabilities

More from cybersecuritynews.com / Cyber Security News

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)