Exploiting remote services using Metasploit

Before we go ahead and exploit the services on remote target system, we must know what all the services are running and what their exact versions are. We can do a quick Nmap scan to list service version information as shown in the following image:

The preceding result shows there are many services running which we can exploit using Metasploit.