How Are Logins Created?

During exploitation, if a host is successfully looted, Metasploit Pro will attempt to create logins based on the type of credential that was captured. For example, if NTLM hashes were looted, then a login for SMB will be added for each hash. For example, a credential pair, such as admin/admin, that can be used to authenticate to a service, like telnet, is a login.