Here’s where we connect the dots. You know the services, you know the attack types, and you know the threat actors. Now let’s put them together – because in a real assessment, when you find a service running, you need to immediately think about what attacks apply to it.
The Service-to-Attack Matrix
FTP (21) – Brute force attacks on credentials, anonymous login abuse, plaintext credential sniffing, directory traversal
SSH (22) – Brute force (very common), exploitation of older versions (like CVEs in OpenSSH), key-based authentication misconfigurations
Part of the free Intro to Cyber course by Cover6 Solutions.