Jump to content

Hackerman

Members
  • Posts

    2
  • Joined

  • Last visited

Posts posted by Hackerman

  1. Thanks for your replies!

    Reverse shell anonymity sounds pretty complicated, so is there another way to take control of victims machine that could be more anonymous than reverse shell? For example is it possible to set victims machine as “server” and then connect to it through tor or VPN? Does anyone have any idea?

  2. Hi,

     I was wondering that when I create a reverse shell malware on a machine, wouldn’t I give away my IP address to the victim? Isn’t it pretty easy for victim to track me using my IP, assuming they are smart enough to find out my malware? Is it possible to get around this?

×
×
  • Create New...