PORTS IN NETWORKING
Vaibhav Ruparel

PORTS IN NETWORKING

  • What are Ports?

-> A port is a virtual point where network connections start and end. Ports are software-based and managed by a computer's operating system. Each port is associated with a specific process or service. Ports allow computers to easily differentiate between different kinds of traffic: emails go to a different port than webpages, for instance, even though both reach a computer over the same Internet connection.

  • What is Port Numbers?

-> Ports are standardized across all network-connected devices, with each port assigned a number. Most ports are reserved for certain protocols for example, all HTTP messages go to port 80. While IP Address enable messages to go to and from specific devices, port numbers allow targeting of specific services or applications within those devices.

  • Most Used Ports with their number?

->01) HTTPS: 443

02) FTP: 20, 21

03) SFTP: 22

04) FTPS: 989, 990

05) SIP: 5060

06) DNS: 53

07) SMTP: 25

08) POP3: 110

09) IMAP: 143

10) Telnet: 23

11) SSH: 22

12) NNTP: 119

13) NNTPS: 563

14) IRC: 194

15) NTP: 123

16) NMP: 161, 162

17) CMIP: 163, 164

18) Syslog: 514

19) Kerberos: 88

20) NetBIOS: 137-139






VAPT

Cybersecurity and Infrastructure Security Agency

Cybersecurity

Network Intelligence

DataSec

DefenseStorm

CompFuber

Dr. Nilesh R Wankhade

Slytherin EduTech Pvt. Ltd.

Laxmi Narayan Sahu

Sadiya B.

#thankyou

要查看或添加评论,请登录

Vaibhav Ruparel的更多文章

  • DARK WEB

    DARK WEB

    What is the Dark Web? --> The Dark web is not just the sites you can access using Google. In fact, that is just a tiny…

  • DEEP WEB

    DEEP WEB

    What is Deep Web? --> Deep web, a part of the Internet that extends beyond the reach of search engines such as Google…

  • SURFACE WEB

    SURFACE WEB

    What is Surface Web? -> Surface web is the normal web which it is visible for all users using internet. The websites in…

  • RANSOMWARE ATTACK

    RANSOMWARE ATTACK

    What is Ransomware Attack? -> Ransomware is a type of malware that locks a victim’s data or device and threatens to…

  • DDoS ATTACK

    DDoS ATTACK

    What is Dos / DDos Attack? -> DDoS Attack means "Distributed Denial-of-Service (DDoS) Attack" and it is a cybercrime in…

  • PHISHING ATTACK

    PHISHING ATTACK

    What is Phishing attack -> Phishing attacks are the practice of sending fraudulent communications that appear to come…

    1 条评论
  • OWASP

    OWASP

    What is OWASP? -> OWASP (Open Web Application Security Project) is a nonprofit organization that provides open-source…

  • CIA TRIAD

    CIA TRIAD

    What is CIA Triad? -> The three letters in "CIA triad" stand for Confidentiality, Integrity, and Availability. The CIA…

  • NMAP

    NMAP

    What is Nmap? -> Nmap is short for Network Mapper. It is an open-source Linux command-line tool that is used to scan IP…

  • MALWARE

    MALWARE

    What is Malware? -> Malware is developed as harmful software that invades or corrupts your computer network. The goal…

社区洞察

其他会员也浏览了