FTP (File Transfer Protocol) Turkish This service, which is a file transfer protocol, is used to transfer files to the server, as its name suggests. You may have used it in Windows tools such as Filezilla, a hostname, password and username are required, but in some cases anonymous may be open for some reasons and can be entered with anonymous:anonymous information, of course do not expect an authorized person, but sometimes it can be, but I have never seen it, only in ctfs. In the video, we did a bruteforce test, we detected the vulnerable application, we found its exploit, we ran this exploit in metasploit and I also used an exploit I found on github.
SSH SSH is actually a bit of a long topic because there is a lot to do with cracking id_rsa keys. I performed a bruteforce test in the video and got a shell. You usually can't be root the first time, but you can be www-data and with that you can increase your authority, which is a completely different topic, and you can be root. With SSH, you enter the system's command line, that is, we can say that entering the terminal where everything is done, i.e. ssh, means entering the site.
Telnet It is the same as Port 22 and performs the same functions. However,
Samba It is a file sharing port, this portused for networked printers, cameras, etc. The networks connected to this system
Tomcat Tomcat, which is a web application that usually runs on port 8080, may have a vulnerability like this: we can find the default passwords and throw shells, of course we can find them with wordlists, but only if a good wordlist is prepared.