Abstrakt: | Reverse shells are a common technique used by attackers to gain unauthorized remote access to systems. This thesis provides a comprehensive analysis of reverse shell methods, focusing on those that utilize tools typically found in standard Linux-based system installations. We list a broad set of techniques involving network utilities, shell interpreters, programming language runtimes, and other system tools. Each method was implemented and tested in a controlled environment to assess its effectiveness and minimal dependencies. Beyond the enumeration of these techniques, the thesis explores countermeasures and best practices for protection against reverse shell attacks.
To facilitate further research and experimentation, we developed an easy-to-use testing framework based on a Makefile, which automates the execution of all analyzed methods.
|
---|