How Are Open Ports Exploited