Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,394,653 papers from all fields of science
Search
Sign In
Create Free Account
Shell shoveling
Known as:
Reverse shell
, Shell shovelling
Shell shoveling, in network security, refers to the act of redirecting the input and output of a shell to a service so that it can be remotely…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
Bash
COMMAND.COM
Input/output
Microsoft Windows
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Εκμετάλλευση της αδυναμίας Eternal Blue με τη χρήση της Python και αρχείων Resource
Γεώργιος Πατραμάνης
2019
Corpus ID: 196175443
The aim of this thesis, is the automation of the exploit that became known in the year 2017, "Eternal Blue". In conjunction with…
Expand
2018
2018
WINDOWS PRIVILEGE ESCALATION THROUGH NETWORK BACKDOOR AND INFORMATION MINING USING USB HACKTOOL
Hidayat Ul Hazazi Ab Wahab
,
Jasni Mohamad Zain
MALAYSIAN JOURNAL OF COMPUTING
2018
Corpus ID: 215833724
A privilege escalation in the Windows system can be defined as a method of gaining access to the kernel system and allowing the…
Expand
2018
2018
Apport de la morphométrie géométrique et de l'imagerie 3D intra-orale dans l'étude du shoveling des incisives centrales maxillaires
D. Carayon
2018
Corpus ID: 193046830
Le shoveling de l'incisive centrale maxillaire est une caracteristique dentaire non-metrique utilisee en anthropologie comme…
Expand
2017
2017
Extending the Metasploit Framework to Implement an Evasive Attack Infrastructure
Aubrey Alston
arXiv.org
2017
Corpus ID: 34076761
Given a desired goal of testing the capabilities of mainstream antivirus software against evasive malicious payloads delivered…
Expand
2015
2015
Signature-based detection of privilege-escalation attacks on Android
Rafay Hassan Niazi
,
Tahir Waseem
,
J. Shamsi
,
Muhammad Mubashir Khan
Conference on Information Assurance and Cyber…
2015
Corpus ID: 17834179
Android has become a major player in smartphone software arena, thanks to the massively positive reception of Google Play by the…
Expand
2012
2012
Chapter 9 – Exploitation scripting
J. Andress
,
Ryan Linn
2012
Corpus ID: 59714988
2011
2011
Societal Roles of Journalism in the Age of the Internet and Digital Television: Slovenian Online Journalists and their Self-Perceptions
Igor Vobič
2011
Corpus ID: 26588485
This paper builds on previous international media and journalism scholarly work on societal roles of journalism, presents…
Expand
2006
2006
Agricultural drill type weed-shoveling machine
周代华
,
姜久才
,
陈家喜
2006
Corpus ID: 116638455
The utility model discloses an agricultural electric dental engine grass spading machine, which comprises a supporting part and a…
Expand
2005
2005
cURL buffer overflow on FreeBSD
James C. Foster
,
Vitaly Osipov
,
Nish Bhalla
,
Niels Heinen
,
Dave Aitel
2005
Corpus ID: 57517597
1997
1997
THE SUPERNOVA REMNANT CTA1 (G 119.5+10.3) : A STUDY OF THE BREAKOUT PHENOMENON
S. Pineault
,
T. Landecker
,
C. M. Swerdlyk
,
W. Reich
1997
Corpus ID: 16418112
The supernova remnant (SNR) CTA1 has been ob- served with the Dominion Radio Astrophysical Observatory Synthesis Telescope, at…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE