Video Description

The reverse shell exploit begins with generating the malicious payload. Several temporary directories need to be created on the pentesting client in order to hold the depackaged files of the xbomb game, post-installation files, and the modified package containing the payload. We use the Metasploit msfvenom tool for generating the payload. One if its advantages is that you don't need to be within the Metasploit framework since it's possible to execute it from the Linux command line.

Course Modules