Exploiting our targets with Metasploit