Launching the Exploit

The exploit command will launch the attack. If everything went well, your payload will execute and potentially provide you with an interactive command shell on the exploited system.