Skip to content

am1tt/port-exploitation-guide

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

6 Commits
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

๐Ÿ› ๏ธ Port Exploitation Guide

This repo is a curated guide and cheat sheet for understanding network ports, related services, and how to map them to potential vulnerabilities and exploits.

โš ๏ธ Built while learning for Bug Bounty, HTB, and Pentesting


๐Ÿ“Œ Port โ†’ Service โ†’ Exploit Mapping (Quick Table)

Port Protocol Common Service Exploitation Ideas
21 TCP FTP Anonymous login, File disclosure, Command injection
22 TCP SSH Weak credentials, Brute-force
23 TCP Telnet Clear-text creds, Default passwords
80 TCP HTTP Web-based attacks, Dirbusting, SSRF
443 TCP HTTPS TLS Misconfig, Burp intercept tricks
3306 TCP MySQL SQLi, Weak creds, DB enumeration
... ... ... ...

โœ… Coming Soon

  • Full service deep dives (FTP, SSH, etc.)
  • Mindmaps for port-based attack decision making
  • Tools like Nmap, Netcat, Hydra usage per port
  • Real examples from HTB + Labs

About

basically visualizing ports and how to approach them and more

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published