Did you know Cybrary's video training is FREE? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
In this module, we take a look at exploits launched from Metasploitable that can result in establishing a shell connection as root on the target host. This is referred to as a "reverse" shell and can be initiated against both Linux and Windows hosts. We begin this module by demonstrating the preparation, installation, and launching of a reverse shell exploit on a Linux system. For this example, we download and modify the built-in XBomb game to be repackaged with the reverse shell payload. Once installed on a victim machine, it's then possible to gain full control of the remote host.