Windows Compromise Using Metasploit: Gaining Access to Target Machines