In this section we will exploit the active ports in different techniques. The ports we are trying to exploit are FTP, SSH, TELNET, SMTP, NETBIOS-SSN, JAVA RMI, BINDSHELL, ProFTPD, MYSQL, DISTCCD, VNC, X11, UnrealIRCD, TOMCAT, RUBY-DRB. 1. 21-FTP Method 1: Login with Anonymous as username and no password. If you need more info about Anonymous FTP you can find it here. https://whatis.techtarget.com/definition/anonymous-FTP-File-Transfer-Protocol ftp 192.168.0.130 Method 2 : Through Brute-force using Hydra but you need to have a custom list of usernames and passwords. hydra -L /root/Desktop/USERNAMES.txt -P /root/Desktop/PASSWORDS.txt <Target IP Address> ftp -V It will take each username and password from the given files and try to login to the target FTP service. Once you found the credentials you can directly log in. After log ging in to a user account, You can get root access by doing Privilege escalation. Method 3 : Exploiting...