Metasploit cookbook for penetration use