The exploit command will launch the attack. If everything went well, your payload will execute and potentially provide you with an interactive command shell on the exploited system.