Before ping deep into building modules, let's understand how the components are arranged in the Metasploit framework, and what they do.