Inside-Out Vulnerabilities, Reverse Shells

Most organizations have some type of perimeter protection that limits access to their internal machines from the Internet [Wilson, 2004]. Even weak perimeter protection schemes, with only ingress filtering on a router or firewall, will stop most external port scans from penetrating into protected...
Richard Hammer
November 10, 2006

All papers are copyrighted. No re-posting of papers is permitted