Offline, yet still exploited | Web Application Security | Scoop.it

A unique kind of communication technique between an attacker machine during the exploitation of any victim machine .In a general scenario, while an attacker exploits the remote machine and gets the remote command prompt (remote shell), the attacker is only able to execute commands till the session from the remote machine is opened (established).