Walkthrough of Metasploitable assessment with Metasploit