Almost deleted this topic, but I guess we don't have much info on this. Perhaps a tutorial is needed.
Nonetheless. Don't think about it as ports, the ports and port numbers are insignificant. What you want to know and do has to do with the software using the ports.
This is a universal task. Once you know what ports are open, you try to figure out what software are using the ports and then you target the software. Ports in them selfs are not vulnerable to anything.
Once you know or think you know what software are running, try looking for existing exploits for the software running. If there are none or they are up to date you would want to move on to find exploits/vulnerabilities. However, always go the easiest path. There is no need to sit hours on hours on hours fuzzing or looking at code to find vulnerabilities when there might be a web-application flaw(which is much easier to exploit). That is, unless you are looking for a challenge