Manual Exploits Workflow Overview The following steps provide an overview of the steps you need to take to manually exploit targets: 1.) Create a list of system targets. 2.) Create a map of all available exploits using references, ports, and service names. 3.) Create a match table of exploits for systems, but do not include devices that are fragile or devices that cannot be exploited. 4.) Create a prioritized queue of exploit modules based on reliability and interleave exploits between hosts. 5.) Execute exploit modules until Metasploit Pro obtains a session.