benefits and use cases of metasploit