Firewall Evasion ComplexityNavigating through various firewall configurations to establish a
reverse shell connection posed significant technical challenges.
Bind Shell AccessibilitySetting up a bind shell required careful planning to ensure it was
accessible and responsive to incoming connections.
Network Security ConstraintsOvercoming network security measures like IDS/IPS systems was
essential for the successful deployment of both shell types.
Detection and ResponseThe risk of detection and subsequent response from security systems
added complexity to deploying and maintaining shell access.