Common Ports + What They Do Flashcards

1
Q

File Transfer Protocol (FTP)

A

20/21

FTP is one of the most commonly used file transfer protocols on the Internet and within private networks. An FTP server can easily be set up with little networking knowledge and provides the ability to easily relocate files from one system to another. FTP control is handled on TCP port 21 and its data transfer can use TCP port 20 as well as dynamic ports depending on the specific configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Secure Shell (SSH)

A

22

SSH is the primary method used to manage network devices securely at the command level. It is typically used as a secure alternative to Telnet which does not support secure connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Telnet

A

23

Telnet is the primary method used to manage network devices at the command level. Unlike SSH which provides a secure connection, Telnet does not, it simply provides a basic unsecured connection. Many lower level network devices support Telnet and not SSH as it required some additional processing. Caution should be used when connecting to a device using Telnet over a public network as the login credentials will be transmitted in the clear.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Simple Mail Transfer Protocol (SMTP)

A

25

SMTP is used for two primary functions, it is used to transfer mail (email) from source to destination between mail servers and it is used by end users to send email to a mail system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Domain Name System (DNS)

A

53

The DNS is used widely on the public internet and on private networks to translate domain names into IP addresses, typically for network routing. DNS is hieratical with main root servers that contain databases that list the managers of high level Top Level Domains (TLD) (such as .com). These different TLD managers then contain information for the second level domains that are typically used by individual users (for example, cisco.com). A DNS server can also be set up within a private network to private naming services between the hosts of the internal network without being part of the global system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Dynamic Host Configuration Protocol (DHCP)

A

67/68

DHCP is used on networks that do not use static IP address assignment (almost all of them). A DHCP server can be set up by an administrator or engineer with a poll of addresses that are available for assignment. When a client device is turned on it can request an IP address from the local DHCP server, if there is an available address in the pool it can be assigned to the device. This assignment is not permanent and expires at a configurable interval; if an address renewal is not requested and the lease expires the address will be put back into the poll for assignment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Trivial File Transfer Protocol (TFTP)

A

69

TFTP offers a method of file transfer without the session establishment requirements that FTP uses. Because TFTP uses UDP instead of TCP it has no way of ensuring the file has been properly transferred, the end device must be able to check the file to ensure proper transfer. TFTP is typically used by devices to upgrade software and firmware; this includes Cisco and other network vendors’ equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hypertext Transfer Protocol (HTTP)

A

80

HTTP is one of the most commonly used protocols on most networks. HTTP is the main protocol that is used by web browsers and is thus used by any client that uses files located on these servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Post Office Protocol (POP3)

A

110

POP version 3 is one of the two main protocols used to retrieve mail from a server. POP was designed to be very simple by allowing a client to retrieve the complete contents of a server mailbox and then deleting the contents from the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Network Time Protocol (NTP)

A

123

One of the most overlooked protocols is NTP. NTP is used to synchronize the devices on the Internet. Even most modern operating systems support NTP as a basis for keeping an accurate clock. The use of NTP is vital on networking systems as it provides an ability to easily interrelate troubles from one device to another as the clocks are precisely accurate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NetBIOS

A

137/138/139

NetBIOS itself is not a protocol but is typically used in combination with IP with the NetBIOS over TCP/IP (NBT) protocol. NBT has long been the central protocol used to interconnect Microsoft Windows machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Internet Message Access Protocol (IMAP)

A

143

IMAP version3 is the second of the main protocols used to retrieve mail from a server. While POP has wider support, IMAP supports a wider array of remote mailbox operations which can be helpful to users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Simple Network Management Protocol (SNMP)

A

161/162

SNMP is used by network administrators as a method of network management. SNMP has a number of different abilities including the ability to monitor, configure and control network devices. SNMP traps can also be configured on network devices to notify a central server when specific actions are occurring. Typically, these are configured to be used when an alerting condition is happening. In this situation, the device will send a trap to network management stating that an event has occurred and that the device should be looked at further for a source to the event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Border Gateway Protocol (BGP)

A

179

BGP version 4 is widely used on the public internet and by Internet Service Providers (ISP) to maintain very large routing tables and traffic processing. BGP is one of the few protocols that have been designed to deal with the astronomically large routing tables that must exist on the public Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Lightweight Directory Access Protocol (LDAP)

A

389

LDAP provides a mechanism of accessing and maintaining distributed directory information. LDAP is based on the ITU-T X.500 standard but has been simplified and altered to work over TCP/IP networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hypertext Transfer Protocol over SSL/TLS (HTTPS)

A

443

HTTPS is used in conjunction with HTTP to provide the same services but doing it using a secure connection which is provided by either SSL or TLS.

17
Q

Lightweight Directory Access Protocol over TLS/SSL (LDAPS)

A

636

Just like HTTPS, LDAPS provides the same function as LDAP but over a secure connection which is provided by either SSL or TLS.

18
Q

FTP over TLS/SSL

A

989/990

FTP over TLS/SSL uses the FTP protocol which is then secured using either SSL or TLS

19
Q

Echo

A

7

Echo Service, somewhat outdated by ICMP echo. Port just echoes whatever is sent to it. This feature can be used in many attacks, such as Smurf/Fraggle.

20
Q

Port 0

A

Port 0 is reserved by IANA, it is technically invalid to use, but possible. It is sometimes used to fingerprint machines, because different operating systems respond to this port in different ways. Some ISPs may block it because of exploits. Port 0 can be used by applications when calling the bind() command to request the next available dynamically allocated source port number.

Port 0 will also show up if there’s fragmented IP traffic, like a DNS response which exceeds the historic maximum size of 512 bytes.

21
Q

Kerberos

A

88

It is the default authorization technology in Microsoft Windows. It uses third-party ticket authorization and strong cryptography to make it harder for hackers to gain access to a corporate network. With Kerberos, organizations can access the internet without having to worry about compromising their safety.

“Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the internet. Kerberos support is built in to all major computer operating systems, including Microsoft Windows, Apple macOS, FreeBSD and Linux.”

22
Q

WHOIS

A

43

Whois service, provides domain-level information

23
Q

TACACS+

A

49

Terminal Access Controller Access-Control System, provides remote authentication and related services for network access

24
Q

Nessus

A

1241

Nessus Security Scanner

25
Q

RDP

A

3389

Windows Remote Desktop Protocol (Microsoft Terminal Server)

26
Q
A