Using Metasploit in CEH Labs