TYPES OF PORTS IN THE NETWORKING.
All H4ckers must know this ports!!
INTRODUCTION
HEY GUYS!
In today’s post we shall be seeing the most important ports through which you can hack any computers or network
for example PORT22-is SSH Now using NMAP, we can confirm if its open
if so you can use metasploit’s auxiliary/scanner/ssh/ssh-login and hack it.
let’s see all ports now!
What is a port?
A port is a virtual point where network connections start and end. Ports are software-based and managed by a computer’s operating system. Each port is associated with a specific process or service. Ports allow computers to easily differentiate between different kinds of traffic: emails go to a different port than webpages, for instance, even though both reach a computer over the same Internet connection.
What is a port number?
Ports are standardized across all network-connected devices, with each port assigned a number. Most ports are reserved for certain protocols — for example, all Hypertext Transfer Protocol (HTTP) messages go to port 80. While IP addresses enable messages to go to and from specific devices, port numbers allow targeting of specific services or applications within those devices.
Are ports part of the network layer?
The OSI MODEL is a conceptual model of how the Internet works. It divides different Internet services and processes into 7 layers. These layers are:
What are the different port numbers?
There are 65,535 possible port numbers, although not all are in common use. Some of the most commonly used ports, along with their associated networking protocol, are:
Ports 20 and 21: File Transfer Protocol (FTP). FTP is for transferring files between a client and a server.
Port 22: Secure Shell (SSH). SSH is one of many tunneling protocols that create secure network connections.
Port 25: Simple Mail Transfer Protocol (SMTP). SMTP is used for email.
Port 53: Domain Name System (DNS). DNS is an essential process for the modern Internet; it matches human-readable domain names to machine-readable IP addresses, enabling users to load websites and applications without memorizing a long list of IP addresses.
Port 80: Hypertext Transfer Protocol (HTTP). HTTP is the protocol that makes the World Wide Web possible.
Port 110: It is used by the POP3 protocol for unencrypted access to electronic mail. The port is intended for end-users to connect to a mail server to retrieve messages. … If the copier and your mail server are on the same network segment, you shouldn’t need to change anything.
Port 135: Distributed Computing Environment (DCE), a framework and toolkit for developing client/server applications. in Internet — Remote procedure call (RPC), a communication process that allows for executing a subroutine or procedure in another address space.
Port 143:Imap protocol (internet message access protocol) is used by eMail clients for the retrieval of their eMail from designated eMail “post office” servers. … Imap on port 143 is the newer of the two popular protocols used to retrieve eMail from remote mail servers. (The older protocol, pop3, the Post Office Protocol, uses port 110.)
Port 443: HTTP Secure (HTTPS). HTTPS is the secure and encrypted version of HTTP. All HTTPS web traffic goes to port 443. Network services that use HTTPS for encryption, such as DNS over HTTPS, also connect at this port.
Port 1443:TCP port 1433 is the default port for SQL Server. … Client systems use TCP 1433 to connect to the database engine; SQL Server Management Studio (SSMS) uses the port to manage instances of SQL Server across the network.
Port 1444:UDP port 1434 is used for SQL Server named instances. The SQL Server Browser service listens on this port for incoming connections to a named instance. The service then responds to the client with the TCP port number for the requested named instance.
Port 137,138,139:Port 137 is utilized by NetBIOS Name service. Enabling NetBIOS services provide access to shared resources like files and printers not only to your network computers but also to anyone across the internet.
THANKING YOU!!!