Metasploit Architecture

Complete and Continue