[ C ] Reverse Shell
Allows a remote shell connection to be made. Pipes data between the spawned shell and the remote connection via winsock.
[ Code – C ]Reverse Shell Server
In the screenshot below you can see that I’ve got the Reverse-shell server running on my Windows 7 machine, internal address 10.0.0.2 on port 2221, which I connect to using a backtrack VM telnet session. On successful connection one is presented with the target machines command prompt:
The most obvious usage of course is during a hack, to take complete control of your victims PC.