Posts

Showing posts from May, 2020

Reverse Shells

Image
>  A reverse shell is a shell session established on a connection that is initiated from a remote machine, not from the localhost. Attackers who successfully exploit a remote command execution vulnerability can use a reverse shell to obtain an interactive shell session on the target machine and continue their attack. A reverse shell (also called a connect-back shell) can also be the only way to gain remote shell access across a NAT or firewall. Let’s see how reverse shells work in practice and what you can do to prevent them. How a Reverse Shell Works To establish a typical remote shell, a machine controlled by the attacker connects to a remote network host and requests a shell session – this is called a bind shell. But what if the remote host is not directly accessible, for example, because it has no public IP or is protected by a firewall? In this situation, a reverse shell might be used, where the target machine initiates an outgoing connection to a listening network host,

DEEPWEB

Image
Hello hackers, This is my Second Post . This is tutorial explaining how to access deep web. Introduction: There are many types of web ! but some of the main on which i will focus on my blog are: 1. Surface Web 2. Dark net 3.Deep web Surface web:  We use surface web most of the time and they are website or resources which can be accessed by search engine such as google,bing etc. They are the sites which can be accessed by our simple web browser like Firefox and chrome or any browser.It is in upper part of internet. According to the source the google index contains 14.5 billions pages. The surface web consist of 10 Percent of the information that is on internet . Dark net : Darknet  are basically middle of internet which contains both surface web and deep web resources.It is smaller than deep web and it is used for mostly file sharing and other like privacy, cybercrime,leaks.It is not too deeper.you will need tor browser to access i