How to use the Metaploit framework