This chapter discusses vulnerability exploitation, including using tools like nmap scripts, Nessus, OpenVAS, Hydra, and Metasploit to identify and exploit vulnerabilities. It emphasizes obtaining tools from reliable sources, testing in a lab environment first, and explaining risks to the client. Metasploit is introduced as a framework for hundreds of exploits and payloads that can be used to deliver a "bomb" via a "bomber." The chapter demonstrates launching Metasploit, exploring exploits and payloads, specifying targets and payloads, executing exploits, and interacting with sessions.