Security musings (reflectorium)
Security musings (reflectorium)
Reverse (SSH) shells
I know that reverse shells are used by trojans for ages.
http://www.brandonhutchinson.com/ssh_tunnelling.html
has a handy description of this is configured with standard openSSH.
READ: How do I get to log in on machine A from home with SSH, by making A connect to me (rather vice versa).