This script works by identifying attempted connections from remote hosts. By executing code that causes a remote system to connect back to our listening server, it is possible to verify that remote code execution is possible by exploiting a particular vulnerability. If wget or curl are not installed on the remote server, another means of identifying remote code execution may need to be employed.