Chapter 9: Connecting with the Metasploit Framework