Using Metasploit for post-exploit activities