Once the exploit is launched, Metasploit will establish a session on the target system. We can now use the sessions command to list the active sessions and interact with the compromised system.
Hundreds Of Plugins Exclusive Deals Leading Online Shop