Ports And Protocols Flashcards

1
Q

FTP

A

FTP
Ports 20, 21
Provides insecure file transfers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SSH

A

Secure Shell
Port 22
Provide secure remote control of another machine using text-based environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SFTP

A

Secure file transfer protocol
Port 22
Provide secure file transfer using SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Telnet

A

Port 23
Insecure remote control to another machine using a text-based environment
No encryption, sent in the clear. Do not use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SMTP

A

Simple mail transfer protocol
Port 25
Provides ability to SEND emails over the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DNS

A

Domain name system
Port 53
Converts IP addresses to domain names and vice versa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DHCP

A

Dynamic host control protocol
Port 67, 68
Automatically provides network parameters to your clients, such as their assigned IP address, subnet mask, default gateway, DNS server they should use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TFTP

A

Trivial file transfer protocol
Port 69
Used as a lightweight file transfer method for sending configuration files or network booting of an operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HTTP

A

Hypertext transfer protocol
Port 80
Used for insecure web browsing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

POP3

A

Post office protocol version 3
Port 110
Used for RECEIVING incoming emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NTP

A

Network time protocol
Port 123
Used to keep accurate time for clients on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

NetBIOS

A

Network basic input/output system
Port 139
Used for file or printer sharing in a Windows network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IMAP

A

Internet mail application protocol
Port 143
Newer method of retrieving emails which improves upon the older POP3
Keeps message status synced across devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SNMP

A

Simple network management protocol
Ports 161, 162
Used to collect data about network devices and monitor their status

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

LDAP

A

Lightweight directory access protocol
Port 389
Used to provide directory services to your network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

HTTPS

A

Hypertext transfer protocol secure
Port 443
Secure web browsing using encrypted tunnel (TLS or SSL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SMB

A

Server message block
Port 445
Used for Windows file and printer sharing services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Syslog

A

System logging
Port 514
Used to send logging data back to a centralized server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

SMTP TLS

A

Port 587
Secure and encrypted way to send emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

LDAPS

A

LDAP secure
Port 636
Provide secure directory services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

IMAP over SSL

A

Port 993
Secure and encrypted way to receive emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

POP3 over SSL

A

Port 995
Secure and encrypted way to receive emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

SQL

A

Structured query language
Port 1433
Used for communication from a client to the database engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Oracle

A

Port 1521
Used for communication from a client to an Oracle database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

MySQL

A

Port 3306
Used for communication from a client to the MySQL database engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

RDP

A

Remote desktop protocol
Port 3389
Provides graphical remote control of another client or server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

SIP

A

Session initiation protocol
Ports 5060, 5061
Used to initiate VoIP and video calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Port 5061

A

SIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Port 5060

A

SIP

30
Q

Port 3389

A

RDP

31
Q

Port 3306

A

MySQL

32
Q

Port 1521

A

Oracle

33
Q

Port 1433

A

SQL

34
Q

Port 995

A

POP3 over SSL

35
Q

Port 993

A

IMAP over SSL

36
Q

Port 636

A

LDAPS

37
Q

Port 587

A

SMTP TLS

38
Q

Port 514

A

Syslog

39
Q

Port 445

A

SMB

40
Q

Port 443

A

Https

41
Q

Port 389

A

LDAP

42
Q

Port 162

A

SNMP

43
Q

Port 161

A

SNMP

44
Q

Port 143

A

IMAP

45
Q

Port 139

A

NetBIOS

46
Q

Port 123

A

NTP

47
Q

Port 110

A

POP3

48
Q

Port 80

A

HTTP

49
Q

Port 69

A

TFTP

50
Q

Port 68

A

DHCP

51
Q

Port 67

A

DHCP

52
Q

Port 53

A

DNS

53
Q

Port 25

A

SMTP

54
Q

Port 23

A

Telnet

55
Q

Port 22

A

SSH

56
Q

Port 21

A

FTP

57
Q

Port 20

A

FTP

58
Q

Ports

A

Logical opening on a system representing a service or application that is listening and waiting for traffic
Numbered 0-65,535

59
Q

Well-Known/Reserved Ports

A

0-1023

60
Q

Ephemeral Ports

A

1024-65,535

61
Q

Port 1812

A

RADIUS Authentication Messages

62
Q

Port 1813

A

RADIUS Accounting Messages

63
Q

RADIUS

A

Ports 1812, 1813
Authenticate users, authorize them to services, and account for their usage of those services

64
Q

Port 49

A

TACACS+

65
Q

TACACS+

A

Port 49
Used to perform the role of an authenticator in an 802.1x network

66
Q

VNC

A

Port 5900
Remote access method

67
Q

Port 5900

A

VNC

68
Q

Metasploit

A

Commonly used exploit framework for penetration testing and red team operations. Metasploit can be used to easily run exploits on a machine and connect back to a meterpreter shell.
Default port is 4444

69
Q

Port 4444

A

Metasploit

70
Q

When initiating a new SSH connection, what is transferred between the client and the server?

A

The keys and encryption algorithm that will be used to encrypt the connection

71
Q

What is an SSH Key Authentication?

A

A passwordless SSH login method using a cryptographic key rather than a password.