Course Content
Intro to Cyber
📺 Livestream Timestamp: 3:05:00 — Exploitation Fundamentals

You exploit a system. The vulnerability is triggered. Now what? You need a way to interact with the compromised system and execute commands. That’s what a shell or payload does.

Think of it like breaking into a house. The exploit is breaking through the door. The shell is the way you move around inside.

There are two main types of shells:

A bind shell is where the compromised system listens on a port and waits for you to connect to it.

A reverse shell is where the compromised system connects back to your machine.


Part of the free Intro to Cyber course by Cover6 Solutions.

Scroll to Top