Tutorial: Metasploit environment set up (step by step guide)