0

If when we have a reverse shell and get persistence and we try to access the compromised target from another network different from the one which we created the payload, is that access to the compromised target still possible or only from the network where the payload was created?

schroeder
  • 123,438
  • 55
  • 284
  • 319
  • 2
    "and we try to access the compromised target" -- how would you do that? Reverse shells connect to ***you***, not the other way around. And it's not about where the payload was created, but the IP that was configured in the payload. – schroeder Jul 17 '20 at 20:27
  • 1
    If you create an SSH tunnel from host A to host B, then it's possible for host B to access host A through reverse SSH tunneling. This is useful if host A is behind a NAT device or firewall, which would normally prevent host B from accessing host A. See https://unix.stackexchange.com/questions/46235/how-does-reverse-ssh-tunneling-work for more info. – mti2935 Jul 17 '20 at 21:48

0 Answers0