You might say whoa, but someone I must know tried to prank me by compromising my system using a Trojan. From my experience, it seems like a metasploit reverse connection, assuming it's TCP(cause that most found in tutorials), how to trace back the connection and find the "attacker"? Or is it...