SlideShare ist ein Scribd-Unternehmen logo
1 von 18
PORTS AND PROTOCOLS
TCP & PORT NO 6
 TRANSMISSSION CONTROL PROTOCOL
 Transmission control protocol (TCP) is a network
communication protocol designed to send data
packets over the Internet.
 It is connection oriented
 It as acknowledgement
 It has three handshake method
 It is reliable
 Slow data transformation
UDP & PORT NO 17
 USER DATAGRAM PROTOCOL
 UDP uses a simple connectionless
communication model with a minimum of protocol
mechanism.
 It as NO acknowledgement
 Unreliable
 fast data transformation
FTP & PORT NO 20/21
 File Transfer Protocol
 It used for the transfer of files between a client and
server on a computer network.
 FTP is often secured with SSL/TLS (FTPS) or
replaced with SSH File Transfer Protocol
SSH & PORT NO 22
 Secure Shell (SSH)
 By using it we can access with a console in secure
in SSH
 SSH was designed as a replacement for Telnet and
for unsecured plain text
TELNET & PORT NO 23
 Telnet provided access remote host to a command-
line interface of the system
 Telnet is unencrypt it send plain text over the
network, so it is vulnerable.
 SSH was designed as a replacement for Telnet
SMTP & & PORT NO 25
 Simple Mail Transfer Protocol
 It is used to transfer mail (email) from source to
destination between mail servers and it is used by
end users to send email to a mail system.
 SMTP uses port 25, but SSL/TLS encrypted SMTP
uses port 465
DNS & PORT NO 53
 Domain Name System
 DNS is used widely on the public internet and on
private networks to translate domain names into IP
addresses, typically for network routing.
 For example, the domain
name www.example.com translates to the
addresses 93.184.216.34 (IPv4) and
2606:2800:220:1:248:1893:25c8:1946 (IPv6).
DHCP & PORT NO 67/68
 Dynamic Host Configuration Protocol
 DHCP server can manage UDP/IP settings for
devices on a network, by automatically or
dynamically assigning IP addresses to the devices.
 The DHCP employs a connectionless service
model, using the User Datagram Protocol (UDP).
UDP port number 67 is the destination port of a
server, and UDP port number 68 is used by the
client.
HTTP & PORT NO 80
 Hypertext Transfer Protocol (HTTP)
 HTTP is the main protocol that is used by web
browsers and used by any client that uses files
located on these servers.
POP3 & PORT NO 110
 Post Office Protocol (POP) version 3
 POP was designed to be very simple by allowing a
client to retrieve the complete contents of a server
mailbox and then deleting the contents from the
server.
 POP3 uses port 110, but SSL/TLS encrypted POP
uses port 995.
NTP & PORT NO 123
 Network Time Protocol
 It is a networking protocol for clock synchronization
between computer systems over packet-switched.
 NTP uses UDP/IP packets for data transfer
because of the fast connection setup and response
times.
IMAP & PORT NO 143
 Internet Message Access Protocol
 IMAP version3 is the second of the main protocols
used to retrieve mail from a server.
 IMAP uses port 143, but SSL/TLS
encrypted IMAP uses port 993.
SNMP & PORT NO 161/162
 Simple Network Management Protocol
 SNMP is used by network administrators including
the ability to monitor, configure and control network
devices
HTTPS & PORT NO 443
 Hypertext Transfer Protocol Secure (HTTPS)
 It is an extension of the Hypertext Transfer
Protocol (HTTP) for secure communication over
a computer network.
 The protocol is therefore also often referred to
as HTTP over TLS or HTTP over SSL.
SMB & PORT NO 445
 Server Message Block
 It mainly used for shared information
like files, printers, and serial ports and
miscellaneous communications in a network.
RDP & PORT NO 3389
 Remote Desktop Protocol
 It user with a graphical interface to connect to
another computer over a network connection
 The user employs RDP client software for this
purpose, while the other computer must run RDP
server software
 SQL Server & PORT NO 1433
 Nessus scanner & PORT NO 8834
 ArcSight ESM & PORT NO 8443
 proxy Server & PORT NO 8080

Weitere ähnliche Inhalte

Was ist angesagt?

MikroTik & RouterOS
MikroTik & RouterOSMikroTik & RouterOS
MikroTik & RouterOSFaelix Ltd
 
Network administration and Management
Network administration and ManagementNetwork administration and Management
Network administration and ManagementBry Cunal
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training PresentationRohit Singh
 
MAC Address – All you Need to Know About it
MAC Address – All you Need to Know About itMAC Address – All you Need to Know About it
MAC Address – All you Need to Know About itAsya Karapetyan
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information ProtocolKashif Latif
 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...Tarun Khaneja
 
Network address translation
Network address translationNetwork address translation
Network address translationVarsha Honde
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP AddressingKushal Sheth
 
Packet analysis using wireshark
Packet analysis using wiresharkPacket analysis using wireshark
Packet analysis using wiresharkBasaveswar Kureti
 
Router & functionality
Router & functionalityRouter & functionality
Router & functionalityAmzadKhn
 

Was ist angesagt? (20)

MikroTik & RouterOS
MikroTik & RouterOSMikroTik & RouterOS
MikroTik & RouterOS
 
Mikro tik advanced training
Mikro tik advanced trainingMikro tik advanced training
Mikro tik advanced training
 
Network administration and Management
Network administration and ManagementNetwork administration and Management
Network administration and Management
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training Presentation
 
Network switch
Network switchNetwork switch
Network switch
 
MAC Address – All you Need to Know About it
MAC Address – All you Need to Know About itMAC Address – All you Need to Know About it
MAC Address – All you Need to Know About it
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
 
Tcp/ip model
Tcp/ip  modelTcp/ip  model
Tcp/ip model
 
Bgp protocol
Bgp protocolBgp protocol
Bgp protocol
 
Network address translation
Network address translationNetwork address translation
Network address translation
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Firewalls
FirewallsFirewalls
Firewalls
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
 
Ospf.ppt
Ospf.pptOspf.ppt
Ospf.ppt
 
HUB Device
HUB Device HUB Device
HUB Device
 
Packet analysis using wireshark
Packet analysis using wiresharkPacket analysis using wireshark
Packet analysis using wireshark
 
Router & functionality
Router & functionalityRouter & functionality
Router & functionality
 
Network switch
Network switchNetwork switch
Network switch
 

Ähnlich wie Ports and protocols

Ports and services
Ports and servicesPorts and services
Ports and servicesIlan Mindel
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network priya sehgal
 
Internet ports abduilla
Internet ports abduillaInternet ports abduilla
Internet ports abduillaabdulllam
 
TCP - TCP breaks data into manageable packets and tracks information.pdf
TCP - TCP breaks data into manageable packets and tracks information.pdfTCP - TCP breaks data into manageable packets and tracks information.pdf
TCP - TCP breaks data into manageable packets and tracks information.pdfanjanacottonmills
 
20 Common Ports and their purposes
20 Common Ports and their purposes 20 Common Ports and their purposes
20 Common Ports and their purposes MaryamAlGhaith
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.pptssuserf7cd2b
 
Nachos Theoretical assigment 3
Nachos Theoretical assigment 3Nachos Theoretical assigment 3
Nachos Theoretical assigment 3colli03
 
Transport Layer Port or TCP/IP & UDP Port
Transport Layer Port or TCP/IP & UDP PortTransport Layer Port or TCP/IP & UDP Port
Transport Layer Port or TCP/IP & UDP PortNetwax Lab
 
HNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdfHNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdfAbenetAsmellash
 
TCP RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
TCP  RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdfTCP  RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
TCP RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdfanjaniar7gallery
 
Networking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityNetworking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityManishKumarH
 

Ähnlich wie Ports and protocols (20)

Ports and services
Ports and servicesPorts and services
Ports and services
 
Basic to advance protocols
Basic to advance protocolsBasic to advance protocols
Basic to advance protocols
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
 
Ports
PortsPorts
Ports
 
Internet ports abduilla
Internet ports abduillaInternet ports abduilla
Internet ports abduilla
 
Common ports
Common portsCommon ports
Common ports
 
TCP - TCP breaks data into manageable packets and tracks information.pdf
TCP - TCP breaks data into manageable packets and tracks information.pdfTCP - TCP breaks data into manageable packets and tracks information.pdf
TCP - TCP breaks data into manageable packets and tracks information.pdf
 
Deeps
DeepsDeeps
Deeps
 
Tcp protocols
Tcp protocolsTcp protocols
Tcp protocols
 
Protocols
Protocols Protocols
Protocols
 
20 Common Ports and their purposes
20 Common Ports and their purposes 20 Common Ports and their purposes
20 Common Ports and their purposes
 
Ip
IpIp
Ip
 
6 networking
6 networking6 networking
6 networking
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
 
Nachos Theoretical assigment 3
Nachos Theoretical assigment 3Nachos Theoretical assigment 3
Nachos Theoretical assigment 3
 
Transport Layer Port or TCP/IP & UDP Port
Transport Layer Port or TCP/IP & UDP PortTransport Layer Port or TCP/IP & UDP Port
Transport Layer Port or TCP/IP & UDP Port
 
HNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdfHNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdf
 
Url and protocol
Url and protocolUrl and protocol
Url and protocol
 
TCP RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
TCP  RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdfTCP  RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
TCP RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
 
Networking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityNetworking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber Security
 

Kürzlich hochgeladen

Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Intelisync
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 

Kürzlich hochgeladen (20)

Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 

Ports and protocols

  • 2. TCP & PORT NO 6  TRANSMISSSION CONTROL PROTOCOL  Transmission control protocol (TCP) is a network communication protocol designed to send data packets over the Internet.  It is connection oriented  It as acknowledgement  It has three handshake method  It is reliable  Slow data transformation
  • 3. UDP & PORT NO 17  USER DATAGRAM PROTOCOL  UDP uses a simple connectionless communication model with a minimum of protocol mechanism.  It as NO acknowledgement  Unreliable  fast data transformation
  • 4. FTP & PORT NO 20/21  File Transfer Protocol  It used for the transfer of files between a client and server on a computer network.  FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol
  • 5. SSH & PORT NO 22  Secure Shell (SSH)  By using it we can access with a console in secure in SSH  SSH was designed as a replacement for Telnet and for unsecured plain text
  • 6. TELNET & PORT NO 23  Telnet provided access remote host to a command- line interface of the system  Telnet is unencrypt it send plain text over the network, so it is vulnerable.  SSH was designed as a replacement for Telnet
  • 7. SMTP & & PORT NO 25  Simple Mail Transfer Protocol  It is used to transfer mail (email) from source to destination between mail servers and it is used by end users to send email to a mail system.  SMTP uses port 25, but SSL/TLS encrypted SMTP uses port 465
  • 8. DNS & PORT NO 53  Domain Name System  DNS is used widely on the public internet and on private networks to translate domain names into IP addresses, typically for network routing.  For example, the domain name www.example.com translates to the addresses 93.184.216.34 (IPv4) and 2606:2800:220:1:248:1893:25c8:1946 (IPv6).
  • 9. DHCP & PORT NO 67/68  Dynamic Host Configuration Protocol  DHCP server can manage UDP/IP settings for devices on a network, by automatically or dynamically assigning IP addresses to the devices.  The DHCP employs a connectionless service model, using the User Datagram Protocol (UDP). UDP port number 67 is the destination port of a server, and UDP port number 68 is used by the client.
  • 10. HTTP & PORT NO 80  Hypertext Transfer Protocol (HTTP)  HTTP is the main protocol that is used by web browsers and used by any client that uses files located on these servers.
  • 11. POP3 & PORT NO 110  Post Office Protocol (POP) version 3  POP was designed to be very simple by allowing a client to retrieve the complete contents of a server mailbox and then deleting the contents from the server.  POP3 uses port 110, but SSL/TLS encrypted POP uses port 995.
  • 12. NTP & PORT NO 123  Network Time Protocol  It is a networking protocol for clock synchronization between computer systems over packet-switched.  NTP uses UDP/IP packets for data transfer because of the fast connection setup and response times.
  • 13. IMAP & PORT NO 143  Internet Message Access Protocol  IMAP version3 is the second of the main protocols used to retrieve mail from a server.  IMAP uses port 143, but SSL/TLS encrypted IMAP uses port 993.
  • 14. SNMP & PORT NO 161/162  Simple Network Management Protocol  SNMP is used by network administrators including the ability to monitor, configure and control network devices
  • 15. HTTPS & PORT NO 443  Hypertext Transfer Protocol Secure (HTTPS)  It is an extension of the Hypertext Transfer Protocol (HTTP) for secure communication over a computer network.  The protocol is therefore also often referred to as HTTP over TLS or HTTP over SSL.
  • 16. SMB & PORT NO 445  Server Message Block  It mainly used for shared information like files, printers, and serial ports and miscellaneous communications in a network.
  • 17. RDP & PORT NO 3389  Remote Desktop Protocol  It user with a graphical interface to connect to another computer over a network connection  The user employs RDP client software for this purpose, while the other computer must run RDP server software
  • 18.  SQL Server & PORT NO 1433  Nessus scanner & PORT NO 8834  ArcSight ESM & PORT NO 8443  proxy Server & PORT NO 8080