Creating a reverse shell with Metasploit and capturing its connections