The following screenshot shows that Metasploit has packaged the exploit code (**weaponization**), delivered the exploit onto the target over the network (**delivery**), took advantage of the security vulnerability (**exploitation**), and spawned a bind shell by delivering the payload (**post-exploitation**).
As shown in the screenshot below, the exploit module was able to create a backdoor with the **root** account on the target and **provide a shell** to us. When entering any Linux command, such as whoami and dir, it will be remotely executed and the results will be returned on the shell.