Sitemap

Day 3/100: Understanding Ports

2 min readJun 18, 2025

--

By 0X595

Yesterday (Day 2):
I learned how data moves across the internet — through the OSI model, IP addresses, ports, and protocols like TCP and UDP.

It felt like I finally saw the blueprint of the internet.

But that raised a new question:

“If data moves across IP addresses and ports…
...how do I find out what’s actually running on those ports?”

That’s where today comes in

Today Finding the Open Doors

When you connect to a website, or when an app sends a notification, or when someone logs into a server — that’s all happening through ports.

Each port is like a door assigned to a specific service:

Port — Service
21 — FTP (file transfers)
22 — SSH (remote access)
80 — HTTP (web traffic)
443 — HTTPS (secure web)

If a port is open, it’s a potential entry point. If it’s misconfigured, it’s a potential vulnerability.

Why This Matters

Most beginners (like me a few years ago) run nmap, see 21/tcp open ftp, and move on.

But a real hacker?
They think:

“Can I list files? Can I upload something? Is there a config backup sitting in there waiting to be downloaded?”

That’s the difference between scanning and exploiting.

lesson learnt

I used to look at an Nmap scan and see numbers like:

21/tcp open ftp  
22/tcp open ssh
80/tcp open http

...and think,
“Cool. What now?”

Truth is — every port number is a story.
A vulnerability. A mistake. A way in.

So starting today, I’m learning and sharing one port a day.
What it does, how it works, and how hackers abuse it.

What to Expect from this sub -Series

Each day, I’ll cover:

What the port is used for ?

What attackers look for ?

Real bugs and tools related to it ?

A quick lab or command you can try

Day 4 Starts with Port 21 — FTP

“The Forgotten File Cabinet Still Sitting Wide Open”
Catch you tomorrow

— 0X595

--

--

0X595
0X595

Written by 0X595

Exploring cybersecurity one layer at a time. Writing daily on hacking, tools, and real-world security. 1 days - 1 posts | 0X595

Responses (1)