Skip to content

Details

Every open port is a decision someone made — and attackers know exactly which ones were made carelessly. In this session, we map the most common network services to the threats that target them and walk through how real attacks start with information that's already sitting in the open.

🎯 What We'll Cover
- Common ports and what services run on them — and what that means to an attacker
- Banner grabbing with netcat: pulling service info from an open port
- Attack paths mapped to services: FTP → cleartext creds, SMB → EternalBlue, HTTP → web attacks
- Threat actor categories and what actually motivates them
- What it means when you find an open FTP port on a production machine

🔗 Stay connected:
- Cover6 Solutions: https://www.cover6solutions.com
- YouTube (live streams + replays): https://www.youtube.com/@Cover6Solutions
- Courses and certification prep: https://cover6solutions.com/courses/

🎤 Submit a talk/demo: https://www.papercall.io/cover6community

Related topics

Career Coaching
Cybersecurity
Information Security
Professional Networking

Sponsors

Cover6 Solutions

Cover6 Solutions

Group Organization

You may also like