Video Description

In this final video for creating and launching the reverse shell attack on a Linux target, we review the steps involved and wrap things up by establishing the connection. The handler is started via msfconsole will listen on port 443 for the remote connection. The infected installation package is then unwittingly downloaded and installed by the victim on the target machine. The reverse shell is then launched once the handler on the client has established a connection with the target.

Course Modules

Metasploit