I wonder if when dynamic tunneling onto a target machine an user of this targeted machine can use this same connection to connect back to the attacker machine. For such a situation to happen, some circumstances must be accomplished, as active monitoring and etc. But for the sake of logic, and only theoretical logic, can such a thing happen?
Hence should be interesting to not use dynamic tunneling for attacking hosts mainly when the connection will be hold for a certain period allowing for the target to discover the invasive connection and compromise the attacker machine?
Well, after looking around the machine I figured out that, at least for this scenario, it is not possible.
It doesn’t matter if it’s going to be dynamic of local, as long as the goal is accomplished.