Before we go ahead and exploit the services on remote target system, we must know what all the services are running and what their exact versions are. We can do a quick Nmap scan to list service version information as shown in the following image:
The preceding result shows there are many services running which we can exploit using Metasploit.