Shell shoveling
Shell shoveling, in network security, is the act of redirecting the input and output of a shell to a service so that it can be remotely accessed, a remote shell.[1]
In computing, the most basic method of interfacing with the operating system is the shell. On Microsoft Windows based systems, this is a program called cmd.exe or COMMAND.COM. On Unix or Unix-like systems, it may be any of a variety of programs such as bash, ksh, etc. This program accepts commands typed from a prompt and executes them, usually in real time, displaying the results to what is referred to as standard output, usually a monitor or screen.
In the shell shoveling process, one of these programs is set to run (perhaps silently or without notifying someone observing the computer) accepting input from a remote system and redirecting output to the same remote system; therefore the operator of the shoveled shell is able to operate the computer as if they were present at the console.[2]
See also
- Console redirection
- CTTY (DOS command)
- Serial over LAN redirection (SOL)
- Remote Shell
References
- ↑ "'Inside-out' security pays attention to your revealing, vulnerable outbound traffic". InfoWorld (IDG) 22 (12): p. 49. 2000-03-20. https://books.google.com/books?id=Lz0EAAAAMBAJ&pg=PA49.
- ↑ Information Security Management Handbook (6 ed.). CRC Press. 2007. p. 2839. ISBN 978-1-4200-1358-0.
Further reading
- Netcat Power Tools. Syngress. 2008. p. 170. ISBN 978-1-59749-257-7. http://my.safaribooksonline.com/book/networking/network-management/9781597492577/the-dark-side-of-netcat/sd0e7238_b9781597492577000054.
Original source: https://en.wikipedia.org/wiki/Shell shoveling.
Read more |