![]() ![]() The technology behind the door is what leads to compromise. It is not necessarily the open port that is the risk, but the underlying technology and infrastructure “listening” on that port. After all, the port and listener are simply the door. It communicates on TCP port 5900.Īs mentioned at the outset, open ports provide a more extensive “attack surface” or opportunity for an attacker to find vulnerabilities, exploits, misconfigurations, and other risks due to the allowed network communication over a specific network port. TCP port 5900 VNC – VNC is a tool that is commonly used for remote access administration.It is commonly used with Virtual Desktop Infrastructure (VDI) environments. TCP port 3389 RDP – Remote Desktop Protocol (RDP) is used to display remote GUI desktop sessions of a remote Windows computer.TCP port 3306 MySQL – This port is used for MySQL database communication.TCP port 1433 SQL – Microsoft SQL Server, used throughout many enterprise organizations today communicates over TCP port 1433.These communicate over TCP and UDP ports 135, 137, and 139 and historically have many vulnerabilities TCP and UDP port 135, 137, 139 - Windows Remote Procedure Call (RPC) and Windows NetBIOS over TCP/IP are well-known in Windows networking.TCP port 81 – Commonly used as a web proxy port.Most organizations have deprecated the use of HTTP across the board as it is clear text and insecure communication HTTP port 80 is the legacy, insecure protocol and port in use, while HTTPS is the secured web server protocol and port used for encrypted web communications. TCP ports 80 & 443 HTTP and HTTPS – HTTP (Hypertext Transport Protocol) and HTTPS (Hypertext Transport Protocol over SSL) are today’s web servers’ standard protocols and ports.TCP port 145 IMAP – Internet Message Access Protocol synchronizes and displays emails without the need to download them.TCP port 110 POP3 – Known as the Post Office Protocol, it is used by email clients to synchronize and download mail from remote mail servers.DNS is responsible for converting the IP addresses that are non-intuitive to the human-friendly domain names typed into a web browser It traverses port 53 using TCP and UDP connections. TCP and UDP port 53 DNS (Domain Name System) – a protocol used for name resolution across the Internet.TCP port 25 SMTP (Simple Mail Transfer Protocol) – a protocol used to relay mail from email server to email server.TCP port 23 Telnet – allows interacting with a network endpoint from the command line and is sometimes used as a tool for remote management.TCP port 22 SSH (Secure Shell) – The purpose of SSH is to provide administrators the ability to connect to an endpoint over an unsecured network securely.FTP was not intended to be a secure means of communication TCP port 21 FTP (File Transfer Protocol) – Provides a way to transfer files between computers that operate on the simple get and put concepts to either receive or send files to a remote endpoint.What are these? Note the following ports and their associated communication technologies: There are specific network ports associated with technologies and network communications standards in the enterprise environment, specifically in a Windows network. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |