Using the Metasploit command-line interface