Understanding Reverse Shells

Introduction A reverse shell is a remote shell technique that operates in the opposite direction of normal connections. The target system attempts to connect to the attacker’s system, enabling remote command execution. It’s particularly useful in firewall and NAT environments, as most firewalls block incoming connections but allow outgoing ones. How It Works The basic flow of a reverse shell works as follows: The attacker sets up a listener on their system to receive connections on a specific port Code executed on the target system attempts to connect to the attacker’s system The input and output of the target system are forwarded to the attacker The attacker can execute commands on the target system and view the results While typical remote access involves ’the attacker connecting to the target system’, a reverse shell uses the approach of ‘making the target system connect to the attacker’. This reverse connection is the key to bypassing firewalls. ...

April 27, 2025 · 6 min · 1197 words · In-Jun Hwang

Understanding IPv6 Neighbor Discovery Protocol (NDP)

Overview In IPv6 networks, Neighbor Discovery Protocol (NDP) is a core protocol that manages interactions between network devices. It integrates several IPv4 protocol functions such as ARP and ICMP Router Discovery, enabling more efficient network management. Key Features Multicast-based communication reduces network load Automated address configuration improves management efficiency Enhanced security features support secure network operations 1. Core Functions of Neighbor Discovery Neighbor Node Discovery Automatically finds and verifies MAC addresses of other devices in IPv6 networks. This completely replaces ARP functionality from IPv4. ...

February 24, 2025 · 3 min · 555 words · In-Jun Hwang

How to Install Wine on Ubuntu 24.04 LTS

What is Wine? Wine (Wine Is Not an Emulator) lets you run Windows programs on Linux systems like Ubuntu 24.04 LTS. Rather than being a typical emulator, Wine works by translating Windows commands directly into ones your Linux system can understand. This means better performance than you’d get with traditional virtualization. Main Benefits Runs without a virtual machine, keeping things fast and simple Plays your favorite Windows games through DirectX support Works with everyday Windows software like Microsoft Office 1. Getting Your System Ready Let’s start by updating your system: ...

February 23, 2025 · 2 min · 255 words · In-Jun Hwang

Understanding Linux Logical Volume Manager (LVM)

In Linux systems, storage management is one of the most critical tasks for system administrators. The Logical Volume Manager (LVM) provides flexible storage management by abstracting physical disks into logical units. LVM’s Basic Structure LVM consists of three key layers: Physical Volume An actual disk or partition that has been initialized to be used by LVM. This can be a physical storage device like /dev/sda1, /dev/sdb. Volume Group A collection of physical volumes that are combined into a single storage pool. At this stage, the boundaries of the physical disks are removed, presenting one large storage space. ...

February 21, 2025 · 2 min · 291 words · In-Jun Hwang

Understand How the ARP Protocol Works

ARP(Address Resolution Protocol) is a protocol that finds the MAC address corresponding to an IP address. When communication occurs between devices on a network, it is necessary to find out the MAC address to deliver the packet to the destination. The Role of ARP Convert IP addresses to MAC addresses Identify devices that can communicate directly within the network Optimize performance through ARP caching Detect duplicate IP conflicts (using Gratuitous ARP) ARP Operation Process 1. ARP Request (ARP Request) When a host knows the destination IP address but not the MAC address, it broadcasts an ARP request to the network. ...

February 20, 2025 · 2 min · 420 words · In-Jun Hwang