This document discusses using guided missiles in drive-bys through automatic browser fingerprinting and exploitation with the Metasploit Framework's Browser Autopwn module. It describes how the module fingerprints browsers to determine effective exploits, selects targeted exploits, and aims for stealth to evade detection. Examples are provided of writing exploits for the module and its advantages over commercial tools. The document encourages downloading and contributing to its continued development.