Description Attackers may create a TCP stream using the shell command line to generate a reverse shell, enabling remote access to the endpoint. Attacker's Goals Data unavailable. Investigative Actions Data unavailable.