I understand the reverse meaning, it should be used to support ssh to the target of the non-current network, usually a relay server is established, exposed to the public network, and the target machine is connected to the relay server, but the document that confuses me is that the victim How does the attacker know about the attacker's machine (server side)