Extending the Language with a Malware API
Creating a Remote Reverse Shell Tunnel Attackers use remote shells to connect to their victim's remote machine using an interactive shell. Remote shells enable an attacker to execute OS commands as though he were sitting in front of the victim's machine, and execute commands on behalf of the victim's identity on which the shell's process is running. Telnet and RSH are two examples of “legitimate” services that enable remote clients to connect to another machine and execute commands via the shell's console. Those “direct” or “forward” remote shells are established by the client to the server (the server must, of course, listen to those requests and decide whether to accept them). From an attacker's point of view, it is beneficial to be able to connect to a remote machine and execute OS-level commands. After breaking into a machine, the attacker can set a remote shell server on the machine so that he can establish connections to the machine at a late