How to Attack Open Ports for SSH, Telnet, HTTPs - Practical Pentesting

How to Attack Open Ports for SSH, Telnet, HTTPs – Practical Pentesting

In this video, Alexis @HackerSploit and I share thoughts on how to attack common ports like 22, 23, 80, 8080 for penetration testing.

Full video:
Cybertalk Podcast (Spotify):
Cybertalk Podcast (Apple):
Alexis (HackerSploit) channel:

10 Points for PentesterLab PRO:
Ask your questions:

Python Basics course (coupon applied):
Join my SQUAD for free (for more discounts):
Learn hands-on pentesting (free trial):
Hacker Wearables:

Join me and other cyber-geeks in our Discord community (free):

My laptop for pentesting video:

Hire me as a penetration tester:
101 Pentesting Training:
101 Cybersecurity Consulting:
Paperspace credit:
DigitalOcean credit:

Connect with me:

Help me continue creating videos:

Facebook page:
Facebook group:

Books I recommend for Penetration Testing and Ethical Hacking:

1. TJ O’Connor – Violent Python:
2. Dafydd Stuttard – Web App Hacker’ s Handbook (2nd Ed):
3. Peter Yaworski – Web Hacking 101:
4. Jon Erickson – Hacking: The Art of Exploitation (2nd Ed):

5. Peter Kim – The Hacker Playbook 3 (2018):

My free Developing Ethical Hacking Tools with Python course on Cybrary:

It helps me tremendously if you support these educational videos:

If you’re a Youtuber, how can you survive without TubeBuddy?:
Whatever type of tests you’re doing, only perform them in safe and legal environments and with the appropriate permissions.

20 thoughts on “How to Attack Open Ports for SSH, Telnet, HTTPs – Practical Pentesting

  1. Recon in Cybersecurity course:

    Python for Pentesters course:

    Python Basics course:

    Hands-On Training with PentesterLab PRO:

    For coaching in pentesting and bug bounty:

  2. i there, how to know from which port we got attacked or virus?? For example we have one pc and we got virus on it, how we can to know from which port exactly virus came or attacked. Thnx

  3. Ftp you stick that into a browser and can see all their files. Some are password protected. But some are very very revealing. If you want vnc then use shodan and have port:5901 authentication disabled and most will not even have passwords or are behind fire walls. You can literally get into scada systems, ahells, windows desktops and Linux desk tops. It's amazing 2020 and people still don't protect vnc with a fire wall at minimum. Most will even with authent disabled if you have firewall you won't even need any passwords cos you can block all untrusted ips and no one will get in.

  4. shodan is a very useful resource specially if you combine it with your own scripts and put some filters on it. You make your work more efficient

Leave a Reply

Your email address will not be published. Required fields are marked *