Integrating BeEF and Metasploit attacks