Did you know Cybrary's video training is FREE? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
The reverse shell exploit begins with generating the malicious payload. Several temporary directories need to be created on the pentesting client in order to hold the depackaged files of the xbomb game, post-installation files, and the modified package containing the payload. We use the Metasploit msfvenom tool for generating the payload. One if its advantages is that you don't need to be within the Metasploit framework since it's possible to execute it from the Linux command line.