Skip to main content

Ethical Hacking simplified. TCP/IP ports (System Fundamentals).

TCP/IP ports


TCP/IP ports are like doors which the device used to connect to other devices. Ports do not only give path for communication but they also grouped data or services. This ports are assigned with numbers which serves as identifiers. For example using the port 80 or 8080, you are sending or receiving HTTP files, because the port number is assigned to Hypertext Transfer Protocol this protocol main responsibility is sending and receiving websites pages. The TCP/IP ports ranges from 0 to 65535.
Ports are divided into the following categories.
  • Well Known ports
  • Registered ports
  • Dynamic ports

Well Known ports: This are the commonly used ports. This category ranges from 0 to 1024. They are the ones that we interact with more frequently.

Some of the most used Ports
Use Port Numbers

FTP 20, 21
SSH 22
Telnet 23
SMTP 25
WINS 42
DNS 53
HTTP 80, 8080
Kerberos 88
POP3 110
Portmapper – Linux 111
FTP over SSH 115
NTP 123
RPC-DCOM 135
SMB 139
IMAP 143
SNMP 161, 162
BGP 179
BGMP 264
MAC OS X server Admin 311
LDAP 389
UPS 401
CIFS 445
Syslog 514
DHCPv6 client 546
DHCPv6 server 547
SMTP 587
IPP 631
Secure LDAP 636


Registered ports: This are ports that are used by applications which the user is not concern about. They are ports which some software used to help them accomplish there task. They ranges from 1025 to 49151.

Below are some of the registered ports (they are selected randomly).

Use Port Numbers

Socks5 1080
Nessus Server 1241
Dell open manage HTTPS 1311
SQL Server 1433, 1434
Citrix Applications 1494, 2598
Oracle Listener 1521
Citrix Management 2512, 2513
RDP 3389
IRC 6662–6667
Bit torrent tracker 6969
Avast web shield 8742
Hyper VM HTTP 8887
Xpilot contact 15345

Dynamic ports: This are the ports that are not officially registered and are available for any application to use. They ranges from 46152 to 65535.

Reference: wikipedia.org

NB: For any comment, suggestion or corrections feel free to contact Me through the comment box. Thanks.

Comments

Popular posts from this blog

Microsoft Office for Tablet now on Google Play store

Back in November, Microsoft opened up early previews builds for its new mobile Office applications for Android tablets to those willing to sign up and wait for an invitation. After taking on feedback over the past couple of months, Microsoft has announced that it is expanding its preview scheme by releasing its Office applications to everyone directly through the Google Play Store. The new Office software for mobile unifies Android, IOS, and Windows platforms. Previously each platform had to make do with its own apps, meaning that feature sets differed depending on your operating system and updates were often slow and intermittent. By unifying the Office platform, Microsoft hopes to bring updates and new features to users in a timelier manner. There are still a couple of conditions attached to the preview builds though. Firstly, Office is still limited to ARM-based Android tablets with a screen size between 7 and 10.1 inches. Your tablet will also need to be running Ki...

Ethical Hacking Simplified. Applications of Cryptography

Pretty good Privacy PGP This type of cryptographic Application uses Public key encryption system and  is one of the most popular means of encryption in the world. It is used in securing data, data storage, email, Instant Messaging (instant messaging are messaging system that happens in real time, just like whatsApp, Facebook messenger etc.) and other forms of communication. The early version of this cryptographic application was written by Philip Zimmerman and has it public appearance in 1991. it is part of an open-source project with many version where user can choose the best that suit them. This cryptographic application comes with privacy and security measure that are found in many online systems. The data will travel in an encrypted form (chipertext), upon arriving at the receiving end, the receiving will use PGP to decrypt the data back to plaintext. PGP uses the Public/Private key encryption. Where the sender uses his public key to encrypt data, and the receiver ...

Tips for strong password

As we have already discussed that passwords are strong and at the same time weak! If user create password from his name, date of birth or any other combination that is related to him, cracking down his account doesn't need much technical know how. Meaning attacker who know you, can be lucky enough to access your sensitive information by only entering certain key combinations. Creating strong and almost non hackable wait!!! is there any non hackable password! I was once told that any system can be hacked! It only took time, skills and resources! You are absolutely right! But at-least one has to really suffer before getting your data! Arm robbers do rob banks! Do you think a local or common thief can rob bank? The ans is absolute NO! Strong passwords doesn't happen by chance! Below are the steps to create a very strong passwords! Passwords should be at-least 8 characters Its already becoming standard on the internet. Many websites doesn't allow less than 6 charact...