Video Description

A key component of the reverse shell exploit is a handler that runs on the client machine listening on a designated port for connection requests from the infected target. In this video we review the steps for generating the payload and then packaging it up into an infected installation file. The objective is to trick personnel with access to the victim host into installing the infected xbomb game on the target machine. This is typically achieved by a social engineering attack whereby the victim is tricked into clicking on a link, which in turn downloads and installs the infected game on the target.

Course Modules