Ports Flashcards
Telnet
tcp/23
It’s used to provide a command line interface for communication for a remote device. TCP is used to make sure that the packets of data are sent reliably
ZERO encryption
SSH
tcp/22 Secure Shell
similar to Telnet but uses encryption when connecting to routers.. or switches..
DNS
udp/53
tcp/53 for large transfers
converts names to IP addresses
SMTP
tcp/25 plaintext
tcp/587 using TLS encryption
Simple Mail Transfer Protocol is a server to server transfer protocol
POP3
Post office Protocol version 3
tcp/110 plaintext
tcp/995 over TLS
Basic mail transfer functionality and can be used offline
IMAP4
Internet Access Message Protocol v4 which includes management of email inbox from multiple clients
tcp/143 (plaintext)
tcp/993 over TLS
SFTP
tcp/22 SSH File Transfer Protocol
provides system functionality by resuming interrupted transfers, directory listings, and remote file removal
Encrypted
FTP
tcp/20 (active mode data)
tcp/21 (control)
FTP transfers files between systems
TFTP
udp/69
Trivial File Transfer Protocol doesn’t authenticate and is simple.
DHCP
udp/67
udp/69
Requires a DHCP server, at home it would be in a wired or wireless router
Dynamic/pooled
- IP addresses are assigned in real-time from a pool
- each system is given a lease and must renew at set intervals
DHCP reservation
- addresses are assigned by MAC address in the DHCP server
- quickly manage addresses from one location
HTTP / HTTPS
tcp/80 web server communication
tcp/443 over TLS or SSL web server communication with encryption
SNMP
udp/161
Simple Network Management Protocol
v3 - A secure standard with message integrity, authentication, and encryption
udp/162 SNMP traps are alerts and notifications from the network devices
Syslog
udp/514
Standard for message logging with diverse systems, consolidated log
Usually a central log collector integrated into the SEIM
RDP
tcp/3389
Remote Desktop Protocol shares a desktop from a remote location and connect to an entire desktop or just an application.
NTP
udp/123
Switches, routers, firewalls, servers, workstations where every device has its own clock.
Synchronizing the clocks becomes critical especially for log files, authentication information, and outage details.