¨Uses HHTP as a covert channel
¨Allows an attacker to remotely
access a victim machine with a command-line prompt
¨A Reverse WWW Shell server and Perl interpreter must
be installed on the victim machine
¨A Reverse WWW Shell master software and Perl
interpreter must be installed on the attacker’s machine
¨Can
sneak past firewall