Step 3 – setting up Metasploitable