Case study – decrypting the Metasploit Reverse HTTPS Shellcode