Metasploitable 3 Windows Walkthrough Page
sessions This will reveal a list of active sessions, including the one we just established. We can now use the session -i command to interact with the compromised system.
sessions This will reveal a list of active sessions, including the one we just established. We can now use the session -i command to interact with the compromised system.