So you have physical access to your target machine, but you have a short amount of time to deploy and attack, what do you do? How about deploy a reverse shell within 15 seconds?…