This document provides an overview of network exploitation and the Metasploit framework. It begins with definitions of key terms like vulnerability, exploit, and payload. It then explains the basic process of exploitation as using an exploit to trigger a payload after a vulnerability is triggered. The document outlines common steps attackers use like port scanning and service identification. It introduces the Metasploit framework as an open-source tool for penetration testing and exploit development with over 770 tested exploits and 228 payloads. It concludes with examples of using tools like nmap for port scanning and compiling exploits to demonstrate exploitation of a known vulnerability.