Once we have complete control over one computer in the system, our next step should be to pivot into the network and try exploiting and gaining access to as many machines as possible. In this recipe, we will learn the easy way to do this: by using Metasploit.