Exploiting the target application with Metasploit