Hi,
Yes you need a service bound to that port. If I was to run on a windows host netstat -aon I will see my host listening on port 3389 for instance (RDP). The port is 3389, the 1404 is the PID, which under task manager is TermService.
TCP 0.0.0.0:3389 0.0.0.0:0 LISTENING 1404
The option -a = All connections and listening ports o= Displays the owning process ID associated with each connection and -n displays addresses and port numbers in numerical form.
In terms of hacking, why would you open a port if nothing is bound to it? If you nmap the machine, I believe it would be classed as an closed port. This could give you at least OS detection, which could lead to a more specific and targeted attack. I suggest closing ports that are not required. NMAP guide https://nmap.org/book/man-port-scanning-basics.html
joel