Video Description

In this module, we take a look at exploits launched from Metasploitable that can result in establishing a shell connection as root on the target host. This is referred to as a "reverse" shell and can be initiated against both Linux and Windows hosts. We begin this module by demonstrating the preparation, installation, and launching of a reverse shell exploit on a Linux system. For this example, we download and modify the built-in XBomb game to be repackaged with the reverse shell payload. Once installed on a victim machine, it's then possible to gain full control of the remote host.

Course Modules