Social Engineering : Working with Sessions

Working with Sessions

After you distribute the executable or file format exploit, you will need to check Metasploit Pro for sessions. If someone has run the executable or file format exploit, you will see a session logged against the victim’s machine. The session remains open until the victim powers off their computer or you manually terminate the session.