Using ADSI management commands in Metasploit