Bind Shell Vs Reverse Shell Explained: Step-By-Step Tutorial For Cybersecurity Enthusiasts