# Using Reverse Shells

This kind of shell can be created either by running an exploit and executing a shellcode that connects back to Exploit Pack or directly by making a binary/py and manually running it in the remote computer. ‌&#x20;

Do not confuse this reverse shell with the XSS/VBS/PS agents, they also provide a connection back to Exploit Pack but they are different because these reverse shells are meant to be used as a step-stone to escalate privileges and run local exploits to pivot to another part of the targeted network during your pentest. ‌&#x20;

The first option, more frequently used, will be to obtain this shell through an exploit ( adding it as a shellcode ) but if you want to create it manually select the "**Reverse shell**" icon on the **toolbar** and follow the **wizard**, select the platform of your choice and set up the values that you have on your workstation then click the "**Next**" button.

![](https://1112023788-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MU9W-baGw5TeUzNXoyo%2F-MdReQwwbpdY7DdxBI5F%2F-MdRfLqcNOBWkNT94mqv%2F31.png?alt=media\&token=8ec7f694-2301-4e9b-9b44-0a714141da0c)

After this is done, you will see the code in **Python** format, if you need to have a binary we recommend you to use something like Py2Exe: [http://www.py2exe.org/​](http://www.py2exe.org/%E2%80%8B)

![](https://1112023788-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MU9W-baGw5TeUzNXoyo%2F-MdReQwwbpdY7DdxBI5F%2F-MdRffAIX7p4K57QHD91%2F32.png?alt=media\&token=c22f97d9-8519-4d1a-82b0-c84e92ace141)
