Let's wrap up this chapter by bringing together two topics: backdoor injection into a legitimate executable and using Metasploit as the payload generator and handler. We're going to use Shellter and nested meterpreter payloads to create a malicious AutoRun USB drive. Although AutoRun isn't often enabled by default, you may find it enabled in certain corporate environments. Even if AutoRun doesn't execute automatically, we're going to work with an executable that may encourage the user to execute it by creating the impression that there's deleted data on the drive that can be recovered.