Let's perform some post-exploitation attacks in the lab environment. We will use the Metasploitable 3 virtual machine as an entry point, since we know there are vulnerabilities that exist.
Using the windows/smb/ms17_010_eternalblue exploit, we will spawn a Meterpreter session. Once we have the session established, we will escalate to system privileges using the getsystem command.
Once we have a Meterpreter session, we will confirm the current system's information using the sysinfo command:

Figure 20: Confirming current system information
Here, we have some interesting information: we can see that there are three users who are logged in. Let's proceed and perform credential harvesting.