If you're trying to learn how hackers do their thing then just understanding metasploit is the tip of the iceberg. You should look at the wider context, around portscanners and vulnscanners, banner grabbing and OS fingerprinting, phishing and malware and networks and everything in between.
Best way to do all of that is to download backtrack and have a play on your own computer, theres some VM images of exploitable machines that you can download to try. But you really need to play with a linux box like backtrack.
↧