Once we have complete control over a computer in the system, our next step should be to pivot into the network and try exploiting and getting access to as many machines as possible. In this recipe, you will learn the easy way to do that with Metasploit.