common protocols and there port numbers-

common protocols and there port numbers-

Protocols-

Network Protocols consist of predefined regulations that oversee the exchange of data, ensuring a secure, dependable, and straightforward process. These rule sets cater to a wide array of applications, with notable examples encompassing wired networks, such as Ethernet, wireless networks like WLANs, and Internet communication.

14 Network protocols-

1.Address Resolution Protocol (ARP)

2. Domain Name System (DNS)

3. File Transfer Protocol/Secure (FTP/S)

4. Hypertext Transfer Protocol/Secure (HTTP/S)

5. Internet Message Access Protocol (IMAP)

6. Post Office Protocol (POP3)

7. Remote Desktop Protocol (RDP)

8. Session Initiation Protocol (SIP)

9. Server Message Block (SMB)

10. Simple Mail Transfer Protocol (SMTP)

11. Simple Network Management Protocol (SNMP)

12. Secure SHell (SSH)

13. Telnet

14. Virtual Network Computing (VNC)

Network port-

A network port serves as a virtual point of origin and termination for network connections. These ports are entirely software-based and under the control of a computer's operating system. Each port corresponds to a particular process or service, enabling computers to distinguish between various types of traffic. For example, emails and webpages may both arrive at a computer via the same Internet connection, but they are directed to different ports.

?Port number-

Network ports adhere to standardized numbering conventions across all connected devices. Each port is assigned a unique identifier. Many of these ports are earmarked for specific protocols. For instance, all Hypertext Transfer Protocol (HTTP) data utilizes port 80. While IP addresses facilitate communication with specific devices, port identifiers facilitate the targeting of distinct services or applications within those devices.

What are the various port numbers-

There exists a total of 65,535 potential port numbers, although not all of them are commonly used. Here are some of the most frequently employed ports, each linked to its corresponding networking protocol:

Ports: File Transfer Protocol (FTP). FTP facilitates file transfers between a client and a server.

Port 20 and 21-

File Transfer Protocol (FTP). FTP facilitates file transfers between a client and a server.

Port 22-

Secure Shell (SSH). SSH is one of the tunnelling protocols that establish secure network connections.

Port 25-

Historically, Simple Mail Transfer Protocol (SMTP). SMTP is integral to email communications.

Port 53-

Domain Name System (DNS). DNS plays a crucial role in matching human-readable domain names to machine-readable IP addresses, simplifying web and application access.

Port 80-

Hypertext Transfer Protocol (HTTP). HTTP underpins the World Wide Web.

Port 123-

Network Time Protocol (NTP). NTP ensures synchronized computer clocks, a vital element for encryption.

Port 179-

Border Gateway Protocol (BGP). BGP is pivotal for efficient routing within the Internet's large networks, known as autonomous systems.

Port 443-

HTTP Secure (HTTPS). HTTPS is the secure, encrypted version of HTTP, hosting all HTTPS web traffic. Other services employing HTTPS, like DNS over HTTPS, also use this port.

Port 500-

Internet Security Association and Key Management Protocol (ISAKMP), a part of secure IPsec connections setup.

Port 587-

Modern, secure SMTP with encryption.

Port 3389-

Remote Desktop Protocol (RDP). RDP enables remote connections to desktop computers from other devices.

The Internet Assigned Numbers Authority (IANA) maintains the comprehensive list of ?port numbers and their assigned protocols.

Do Not Scan This IP Address Ranges

Website- https://www.hacking-tutorial.com/tips-and-trick/do-not-scan-this-ip-address-ranges/#sthash.QupRsfDY.dpbs

要查看或添加评论,请登录

Amarjit Gajare的更多文章

  • Mitigation of OWASP Top 10 (2021) Vulnerabilities:

    Mitigation of OWASP Top 10 (2021) Vulnerabilities:

    The Open Web Application Security Project (OWASP) is a non-profit entity dedicated to offering guidance for secure…

  • IDS And IPS

    IDS And IPS

    Intrusion detection system (IDS)- Intrusion detection system (IDS) continuously observes network traffic, scrutinizes…