So a reverse shell where the attacker is the listener( listens on a specific port for connection ) and the target machine tries to connect to the listener. If connection is successful , the attacker gets a shell back. Now the attacker has control over target machine.