Forum Thread: Help Regarding Port based Attacks

Help Regarding Port based Attacks

These Are ports open on the target machine. Now I use which Port For exploit the target
Not shown: 978 filtered ports
21/tcp open ftp
22/tcp open ssh
25/tcp open smtp
26/tcp closed rsftp
80/tcp open http
110/tcp open pop3
143/tcp open imap
443/tcp open https
465/tcp open smtps
587/tcp open submission
993/tcp open imaps
995/tcp open pop3s
3306/tcp open mysql
50000/tcp closed ibm-db2
50001/tcp closed unknown
50002/tcp closed iiimsf
50003/tcp closed unknown
50006/tcp closed unknown
50300/tcp closed unknown
50389/tcp closed unknown
50636/tcp closed unknown
50800/tcp closed unknown

4 Responses

I think you misunderstood. Ports are only one small part recon. You need the OS, services, applications, etc to determine an attack. When you have gathered all that info, you can go to or other vulnerability database to find the appropriate vulnerability and exploit.

In addition, if this is a Windows machine, Microsoft just released eleven new vulnerabilities on their TechNet Security Bulletin. It looks like three of them are remote code execution vulnerabilities. You could definitely use some of those.

To add to OTW's comment, Be careful, this looks like a honeypot to me

( Its just my opinion )

# Sergeant

Share Your Thoughts

  • Hot
  • Active