This article explains how to use Kali Linux and Metasploit to exploit Windows operating system remotely. The article covers the requirements, commands, and steps to execute the exploit. The exploit enables the attacker to get full access to the victim's machine with user rights. The article is relevant to ICT ethical hacking and penetration testing courses.