Jump to content

How do hackers take advantage of open ports as a vector for an attack?

Ethio Cybrary

Recommended Posts

It's not the open port alone, that's not enough :)

It requires something that listens / answers on that port, and that service have to be misconfigured, or exploitable for it to be used as an attack vector.
But, of course it also needs to be open, for something to go through to the service, and the firewall have to allow outbound connections back :)

Link to comment
Share on other sites


This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Create New...