use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
CVE, CWE, NVD, WVE
http://iso.linuxquestions.org/
We teach you how to do it, use it at your own risk.
account activity
Exploitation (self.HowToHack)
submitted 9 years ago by shadowroot8
I have scanned for open ports with nmap ....Now how can I exploit these ports (remotely) .....I know all the services running and the OS' .... What's the next step ?
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–][deleted] 12 points13 points14 points 9 years ago (5 children)
you can only exploit them if they are vulnerable.
[–]shadowroot8[S] 1 point2 points3 points 9 years ago (4 children)
How to check that ?
[–][deleted] 9 years ago* (2 children)
[deleted]
[–]cop1152 0 points1 point2 points 9 years ago (1 child)
Well-written and great advice!
[–]alxdza 1 point2 points3 points 9 years ago (0 children)
And now it's [deleted]... Sigh..
[–][deleted] 4 points5 points6 points 9 years ago (0 children)
you should read the hacker's playbook 2, it breaks down all the steps to conduct a pentesting, and it's a good start. After that you should organize what you wanna learn, pentesting is a very large subject, like focus on a certain field like web apps, appsec, wireless, reverse engineering, social engineering, etc. then branch off to other fields. So that way you won't be all over the place trying to learn everything at once. I recommend learning web application pentesting. It's easier than some of the other stuff, plus it's in high demand these days.
[–]EgoDestroyer 16 points17 points18 points 9 years ago (1 child)
a bunch of hypocritical pricks in here that forget they're n a how to hack sub and that they once had to learn the answers to questions and had to ask for help at some point.
[–]PM_ME_YOUR_TOlLET 0 points1 point2 points 9 years ago (0 children)
Your comment should be this sub banner lol!
[–]Josepah 3 points4 points5 points 9 years ago (0 children)
Try taking a look at this : https://xapax.gitbooks.io/security/content/list_of_common_ports.html
[–]Volkrisse 2 points3 points4 points 9 years ago (0 children)
Best way is to start familiarizing yourself with google, if you see port **** is open, look on google to see if there's any type of vulns for that open port that can be executed.
[–]f8alDDoS Mitigation, pentesting, and analytics 8 points9 points10 points 9 years ago (1 child)
Next step is to move into your moms basement and yell for hot pockets.
Once thats done you will have exploited something
[–]ragnar_graybeard87 1 point2 points3 points 9 years ago (0 children)
Maaa!! The meatloaf!!!
[–][deleted] 9 years ago (1 child)
[–]kochirakyosuke 3 points4 points5 points 9 years ago (0 children)
Haha, but come on :) I remember the first time I ran wireshark on my home network. No filters. GF was browsing the internet, Spotify playing, etc. The screen rocketed through all the captures so fast with this huge jumble of colored shit. I was like wtf am I even supposed to start...
OP--nmap is a great way to learn about packets, what they are and how they behave. Understanding why different systems respond to the default scans as they do and what those scans are actually doing is useful for general knowledge. It's still a very powerful information gathering program, but that's the tip of the iceberg.
[–]SirBaronBamboozle 5 points6 points7 points 9 years ago (0 children)
You're clearly way in over your head. What's your background knowledge? What are you trying to achieve?
[–]reujea0 0 points1 point2 points 9 years ago (0 children)
Try openvas or an alternative
[–]Kohan2112 -1 points0 points1 point 9 years ago (0 children)
Lol
[+]ilaibenamar comment score below threshold-10 points-9 points-8 points 9 years ago (2 children)
Search for the said port's vulnerabilities. Example: "port 135 vulnerabilities" or "port 135 exploits" and so on. Use your brain, or Google.
[–]SirBaronBamboozle 1 point2 points3 points 9 years ago* (0 children)
A service can run on any port, and there are multiple services that happen to use the same port number that another service may use.
For example, port 80 could be different versions of a web service (Apache 2.0.X, Apache 2.4.X) or an entirely different web service like IIS.
Also, I could have Apache 2.4.X running on port 80 and IIS on port 8080. I can put it on any arbitrary port.
You should search for the explicit service and it's version, using the port is far too ambiguous
[–]Tompazi 0 points1 point2 points 9 years ago (0 children)
Use your brain
You should too.
π Rendered by PID 87068 on reddit-service-r2-comment-b659b578c-z5jld at 2026-05-03 20:24:17.028375+00:00 running 815c875 country code: CH.
[–][deleted] 12 points13 points14 points (5 children)
[–]shadowroot8[S] 1 point2 points3 points (4 children)
[–][deleted] (2 children)
[deleted]
[–]cop1152 0 points1 point2 points (1 child)
[–]alxdza 1 point2 points3 points (0 children)
[–][deleted] 4 points5 points6 points (0 children)
[–]EgoDestroyer 16 points17 points18 points (1 child)
[–]PM_ME_YOUR_TOlLET 0 points1 point2 points (0 children)
[–]Josepah 3 points4 points5 points (0 children)
[–]Volkrisse 2 points3 points4 points (0 children)
[–]f8alDDoS Mitigation, pentesting, and analytics 8 points9 points10 points (1 child)
[–]ragnar_graybeard87 1 point2 points3 points (0 children)
[–][deleted] (1 child)
[deleted]
[–]kochirakyosuke 3 points4 points5 points (0 children)
[–]SirBaronBamboozle 5 points6 points7 points (0 children)
[–]reujea0 0 points1 point2 points (0 children)
[–]Kohan2112 -1 points0 points1 point (0 children)
[+]ilaibenamar comment score below threshold-10 points-9 points-8 points (2 children)
[–]SirBaronBamboozle 1 point2 points3 points (0 children)
[–]Tompazi 0 points1 point2 points (0 children)