12. In attacker computer if there’s any vulnerability in victim computer browser it will return sessions value that mean the exploit successfully attacking victim computer. In this case the exploit create new fake process named "Notepad.exe".
13. To view active sessions that already opened by the exploit type "sessions -l" for listing an active sessions. Take a look to the ID…we will use that ID to connect to victim computer.
14. To interract and connect to victim computer use command "sessions -i ID". ID is numerical value that given when you do sessions -l. For example you can see example in picture below.
15. Victim computer already owned.
I’m practice to create this tutorial using Virtual Machine so it will not harm other computer and also you can doing a lot of experience with your OS.
Countermeasure :
1. Don’t trust to unknown link
2. Use personal firewall to detect inbound and outbound traffic
Hope you enjoy it