Metasploit 3.2 on Windows XP

After installing the .exe and launching the new app, I saw this window:

I decided to try exploiting a vulnerable Samba server:

When I set the parameters I ran the exploit:

When I got my session I interacted with a root shell on the victim.

By identifying the process started on the victim (PID 2216) and running lsof, you can see the vulnerable service which Metasploit attacked.
Incidentally, my take on why having these sorts of tools available is In Defense of HD Moore, from three years ago.
Great work Metasploit team!
Richard Bejtlich is teaching new classes in DC and Europe in 2009. Register by 1 Jan and 1 Feb, respectively, for the best rates.
Comments
I am a noob, so i am just wondering.
Thanks
Invitation
Im in the DC/NoVA area and would be very interested in the seminar your company is hosting. I tried clicking on the link and it gave me an error. Any suggestions??
J