Going the extra mile – customizing the Metasploit exploit