Description: Overexposed Services refer to those services on a network that are accessible to unauthorized users, significantly increasing the system’s vulnerability. These services can include web applications, databases, mail servers, and other resources that, if not adequately protected, can be exploited by attackers. Overexposure occurs when security configurations are inadequate, allowing unauthorized individuals to access sensitive information or control critical systems. The main characteristics of these services include a lack of robust authentication, insecure default configurations, and the absence of security measures such as firewalls or intrusion detection systems. The relevance of identifying and mitigating overexposed services lies in the increasing sophistication of cyberattacks, where attackers constantly seek vulnerabilities in poorly protected systems. Proper management of these services is essential to maintain the integrity, confidentiality, and availability of information, as well as to protect the technological infrastructure of organizations.