Note: To run a local exploit, make sure you are at the msf prompt. Also, to check the session ID, use the ```sessions``` command. ``` msf > use <%= mod.fullname %> msf <%= mod.type %>(<%= mod.shortname %>) > show targets ... a list of targets ... msf <%= mod.type %>(<%= mod.shortname %>) > set TARGET target-id msf <%= mod.type %>(<%= mod.shortname %>) > show options ... show and set options ... msf <%= mod.type %>(<%= mod.shortname %>) > set SESSION session-id msf <%= mod.type %>(<%= mod.shortname %>) > exploit ```