Working on the Shell Overview, as this section got into the different types of shells that can be used for exploitation. It works its way through reverse shell, bind shells, web shells, and how to set up a shell listener. It shows how you can use applications like b374k shell to set up a reverse shell that can gain you access to a web application. From there you can attempt privilege escalation to gain more access to the web system for exploitation.
