This whitepaper is an article that covers the basic structure of Metasploit and the need for it as a framework. It provides guidance on the different techniques of information gathering and scans.
6d8d5543a9922644ed97c0a76b13537b5fae0e6518a660c04c7ae634e076bfec