DEV Community

Discussion on: Gaining remote access to a computer with a reverse shell attack in Node.js

Collapse
 
po0q profile image
pO0q 🦄 • Edited

nice post @devdevcharlie, I think people need protection at multiple levels. Reverse shells can be hidden in various resources and written in various languages.

It's particularly efficient, as firewalls won't block outgoing connections, most of the time. If you are in corporate environment, software and user restrictions are strongly recommended.

Reverse shells are hard to detect and stop, but there are good practices. So far, the following approach helps:

  • block unused ports
  • turn off all services, software, features you don't use
  • monitor outgoing traffic, especially for shell commands
  • vulnerability scans + pen-tests, as it happens after initial access
  • security awareness and training to mitigate phishing