| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Web shells as a covert channel Applications continue to be a valuable door for attackers to use for remote access to a network. If an
application is compromised, the webserver itself can be used to enable a C2 channel and provide a
platform for post exploitation.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast