Usage guide on using Metasploit auxiliary modules for information gathering. Some modules are used as examples to show functionality. The need for cyber investigators are booming and the tools available to perform investigations already exist, in most circumstances. While the majority of tools are open source, paid applications exist as well.