Basic Exploitation with Metasploit: Windows: File and Keylogging