Course Content
Intro to Cyber
📺 Livestream Timestamp: 1:30:00 — Common Services, Threats & Attacks

Here’s where we connect the dots. You know the services, you know the attack types, and you know the threat actors. Now let’s put them together – because in a real assessment, when you find a service running, you need to immediately think about what attacks apply to it.

The Service-to-Attack Matrix

FTP (21) – Brute force attacks on credentials, anonymous login abuse, plaintext credential sniffing, directory traversal

SSH (22) – Brute force (very common), exploitation of older versions (like CVEs in OpenSSH), key-based authentication misconfigurations


Part of the free Intro to Cyber course by Cover6 Solutions.

Scroll to Top