Scanning and assessing FTP vulnerability, exploiting FTP anonymous access, using msfvenom to generate payload appropriate for the situation, planting the payload via ftp, and finally exploiting and getting reverse shell. — This article is Part 2 of the series, which explains how reverse shell works. If you haven’t read the Part1, go read it here. https://prafulnair.medium.com/reverse-shells-in-hacking-part-1-6b53affee4dd