Did you know Cybrary's video training is FREE? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
The final step in the Win7 reverse shell exploit is to get the file onto the victim's system. In this example, the attack vector is a USB thumb drive. Once the victim has been enticed to run the executable on the target, the handler running on the client detects the connection requests and establishes a connection with the target. From there, we have full shell access and can perform a host of potentially malicious actions: examine the process list, run the sysinfo command, migrate the connection to another process in order to keep it running, as well as escalate privileges on the target.