A metasploit-based exploiting approach to PLC vulnerabilities