Chapter 3: Foreplay – Metasploit Basics