Hay cleanwithit2008 , most of the time the exploit that comprise a remote serivce will have some type of socket setup in the code. I don't think one person on this site will beable to fully tell you how to exploit a process(part of a serivce,aka function in programming lagunage). I think that C,ruby,pyhton and perl can comprise serivce and IIS and Apache jave(script ,applets),php etcI understand the concept of exploits, and I understand how Metasploit works. Say for instance you want to use a exploit from Milw0rm, how does that work, and how do you send it to a remote machine through a port? I don't know any programming as of yet, but I want to know the process of how it's done.
Hope it helps