Metasploitable 3 Windows Walkthrough -

Once the exploit is launched, Metasploit will establish a session on the target system. We can now use the sessions command to list the active sessions and interact with the compromised system.