A Guide to Hacking Without Metasploit