Cybersecurity Series Understanding Reverse Shell