This is a reverse backdoor connection in which the hacker can run files on the victim's computer
Steps:
- Go to the working directory on both machines
- On the hacker machine run "python listener.py"
- On the victim machine run "python reverse-backdoor.py"