Controlling Metasploit