Hi guys,
Just watch metasploit and Netcat in action.
http://cybexin.blogspot.com/2009/05/using-netcat-as-backdoor.html
Cheers