Remote Command Execution using reverse Shell
A reverse shell is a type of shell connection where the victim communicates with the attacker's computer. The attacker has a listening port active which listens from the victim's machine, this is how command execution works. You need to create a victim file and an attacker file in python/shell(Keep the exploit limited to Linux based OS. No need to create for windows or android). The attacker should have a listening port active and it should access the victim's shell.(Don't Cause Damage to someone else's Computer Files.)
Deliverables:
Submit the code in Pagure/GitHub and and Asciinema recording which shows you are controlling the victim.
Contact Mentor:
Please do not copy someone else's work from the internet. If you have doubts contact the Fedora Summer Coding group using telegram. If you are not already a member you can join the group https://t.me/fedoraSummerCoding