You are on page 1of 9

DA Data 

tructure Algorithm Intervie Preparation Data cience Topic-ie Practice

Difference eteen ind hell and

Revere hell

Difficult Level : Medium ● Lat Updated : 27 ep, 2022

Read Dicu

A hell i a program that interpret our command and give the ritten

command to the operating tem. It act a an inter face eteen the

uer and the operating tem. It take input from the keoard and

give it to the O, and the terminal let ou tpe command and interact

ith the hell.

ome Popular hell:

Windo Poerhell

Windo Command Prompt

ah

h

dah

orn

Korn

Por t

In imple ord, a por t i an opening here a connection can e made.  

For example, for viiting a eite like http://geekforgeek.org, the

connection ill e etalihed to por t 443 ecaue HT TP and the

er ver ue por t 443 for connection. Por t are the numer aociated
ith IP addree.

ome commonl ued por t are :

Por t 21 for control, 20 for data tranfer – F TP

Por t 22 – H

Por t 25 – MTP

Por t 80 – HT TP

Por t 443 – HT TP

Por t 465 – MTP

Por t 587 – MTP

Por t 993 – IMAP

ind hell:

ind hell
A ind hell i a or t of etup here remote conole are etalihed

ith other computer over the netork. In ind hell, an attacker

launche a er vice on the target computer, to hich the attacker can

connect. In a ind hell, an attacker can connect to the target computer

and execute command on the target computer. To launch a ind hell,

the attacker mut have the IP addre of the victim to acce the target

computer.

Revere hell:

Revere hell

A revere hell or connect-ack i a etup, here the attacker mut 몭rt

tar t the er ver on hi machine, hile the target machine ill have to

act a a client that connect to the er ver er ved  the attacker. After

the ucceful connection, the attacker can gain acce to the hell of

the target computer.

To launch a Revere hell, the attacker doen’t need to kno the IP

addre of the victim to acce the target computer.

Di몭erence eteen ind hell and Revere hell


.NO. ind hell Revere hell

1.
ind hell have the litener In the revere hell, the attacker ha

running on the target and the the litener running on hi/her

attacker connect to the machine and the target connect to

litener in order to gain the attacker ith a hell. o that

remote acce to the target attacker can acce the target

tem. tem.

2.
In ind hell, the attacker
In the revere hell, the attacker

몭nd an open por t on the


open hi on por t. o that victim

er ver/ target machine and


can connect to that por t for

then trie to ind hi hell to


ucceful connection.

that por t.

3.
The attacker mut kno the The attacker doen’t need to kno

IP addre of the victim the IP addre of the victim, ecaue

efore launching the ind the attacker i going to connect to

hell. our open por t.

4.
The Revere hell i oppoite of the

In ind hell, the litener i ind hell, in the revere hell, the

ON on the target machine and litener i ON on the Attacker

the attacker connect to it. machine and the target machine

connect to it.

5.
ind hell ometime ill Revere hell can pa the

fail, ecaue modern 몭reall iue ecaue thi target

몭reall don’t allo machine trie to connect to the

outider to connect to open attacker, o the 몭reall doen’t

por t. other checking packet.

Related Article

hell cript to ho the Difference eteen echo “$HLL” and
1. hell cript to ho the Difference eteen echo “$HLL” and

echo ‘$HLL’

2. hell cripting - Difference eteen Korn hell and ah hell

3. Difference eteen Thompon hell and POIX hell

4. Difference eteen v-ind and v-model in Vue.j

5. Difference eteen live() and ind() Method in jQuer

6. Korn hell v ah hell

7. Difference eteen ingle and Doule Quote in hell cript and

Linux

8. Difference eteen hell and Kernel

9. ah cript - Difference eteen ah cript and hell cript

10. ecure hell and TL

Like

Previou Next

What i FTP ounce Attack? What i Replication in

Ditriuted tem?

Ar ticle Contriuted  :
Ar ticle Contriuted  :

richaalan57

@richaalan57

Vote for di몭cult

Current di몭cult : Medium

a Normal Medium Hard xpert

Article Tag : Picked, Computer Netork, Computer uject,

Difference eteen

Practice Tag : Computer Netork

Report Iue

Coure

31k+ interested Geeks 2k+ interested Geeks 756k+ interested Geeks

GATE CS & IT 2024 CBSE Class 12 Computer Complete Interview


Science Preparation ­ Self Paced

Beginner to Advance Beginner to Advance Beginner to Advance


A-143, 9th Floor, overeign Corporate Toer,  
ector-136, Noida, Uttar Pradeh - 201305

feedack@geekforgeek.org

Compan Language

Aout U Pthon

Career Java

In Media C++

Contact U GoLang

Privac Polic QL

Copright Polic R Language

Advertie ith u Android Tutorial

Data tructure Algorithm

Arra Data tructure orting

tring Data tructure earching

Linked Lit Data tructure Greed

tack Data tructure Dnamic Programming

Queue Data tructure Pattern earching

Tree Recurion

Graph acktracking

We Development Write & arn

HTML Write an Article

C Improve an Article

Javacript Pick Topic to Write

oottrap Write Intervie xperience

ReactJ Internhip

AngularJ Video Internhip

NodeJ

Computer cience Data cience & ML

Operating tem Data cience With Pthon
Operating tem Data cience With Pthon

Computer Netork Data cience For eginner

Dataae Management tem Machine Learning Tutorial

oftare ngineering Math For Machine Learning

Digital Logic Deign Panda Tutorial

Computer Graphic NumP Tutorial

ngineering Math OpenCV Pthon Tutorial

Intervie Corner Pthon

Compan Preparation Pthon Tutorial

Preparation for D Pthon Programming xample

Compan Intervie Corner Django Tutorial

xperienced Intervie Pthon Project

Internhip Intervie Pthon Tkinter

Competitive Programming OpenCV Pthon Tutorial

chool [Cla 6-12] UPC/C/ANKING

C Note for Cla 8 C CGL llau

C Note for Cla 9 I PO llau

C Note for Cla 10 IP PO llau

C Note for Cla 11 UPC thic Note

C Note for Cla 12 UPC conomic Note

nglih Grammar UPC Hitor Note

@geekforgeek , ome right reerved

You might also like