A technique used in computer security to gain remote access to a system by establishing a connection from the target system back to the attacker's system.
"The hacker exploited the vulnerability to create a reverse shell and gain control of the server."