How to trace a reverse tcp Trojan?

D

Deleted member 2437163

Guest
You might say whoa, but someone I must know tried to prank me by compromising my system using a Trojan. From my experience, it seems like a metasploit reverse connection, assuming it's TCP(cause that most found in tutorials), how to trace back the connection and find the "attacker"? Or is it can be made trace proof??!
 
Solution

Rdslw

Prominent
Aug 1, 2017
78
0
610
Solution
D

Deleted member 2437163

Guest
I didn't see any TCP connections!! All I saw was standard HTTPS while running!! Wait, there is no reason for that https connection!! Is it the payloads?