Exploiting the vulnerability using Metasploit