How Hackers Take Over Computers With Reverse Shells