Example of a Netcat unencrypted reverse shell on Linux   2016-05-01 23:02:12.930559 IP 192.168.1.100.45222 > 192.168.1.146.4444: Flags [P.], seq 57:96, ack 11, win 229, options [nop,nop,TS val 653200239 ecr 1226323781], length 39 E..[..@.@..D…d…….\0.q.D………….. &..oI.7Euid=0(root) gid=0(root) groups=0(root) 2016-05-01 23:02:12.991630 IP 192.168.1.146.4444 > 192.168.1.100.45222: Flags [.], ack 96, win 259, options [nop,nop,TS val 1226323844 ecr 653200239], length 0 E..4].@…………d.\..D…0.q………… I.7.&..o 2016-05-01 23:02:18.201395 IP 192.168.1.146.4444 > 192.168.1.100.45222: Flags [P.], seq 11:21, ack 96, win 259, options [nop,nop,TS val 1226329053 ecr 653200239], length 10 E..>].@…………d.\..D…0.q…..d…… I.K.&..opwned s0n 2016-05-01 23:02:18.239958 IP 192.168.1.100.45222 > 192.168.1.146.4444: Flags [.], ack 21, win 229, options [nop,nop,TS val 653201567 ecr […]