Web shells as a covert channel
Joe Vest
@joevest
Applications continue to be a valuable door for attackers to use for remote access to a network. If an application is compromised, the webserver itself can be used to enable a C2 channel and provide a platform for post exploitation.
If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek