In this chapter, we learned about the basic terminology of Metasploit Framework, as well as how to install it and set it up on *nix-based and Windows-based systems. Then, we looked at the usage of MSF. We loaded modules/auxiliaries, set target values, and ran them against a host. Finally, we learned how to generate payloads using MSFvenom for exploitation purposes.
In the next chapter, we'll learn how to use Metasploit but with the web interface User Interactive (UI) option. This can really help those who don't have a strong understanding of the command-line interface (CLI).