75 network ports that network security engineers must know (very detailed) from scratch to proficient, just read this article

As a network security engineer, you must be familiar with network ports. Ports are generally divided into the following three categories:

(1) Well-Known Ports: range from 0 to 1023

(2) Registered Ports: from 1024 to 49151

(3) Dynamic/Private Ports: from 49152 to 65535.

  1. Port 20 FTP data port

  2. Port 21 FTP control port

  3. Port 22 SSH port

  4. Port 23 Telnet port

  5. Port 25 SMTP port

  6. Port 53 DNS port

  7. Port 67 DHCP server

  8. Port 68 DHCP client

  9. Port 69 TFTP port

  10. Port 79 Finger service port

  11. Port 80 HTTP port

  12. Port 88 EIGRP protocol port

  13. Port 89 ospf protocol port

  14. Port 99 Metagram Relay service port

  15. Port 102 Message Transfer Agent Port

  16. Port 109 POP2 port

  17. Port 110 POP3 port

  18. Port 111 SUN company's RPC service port

  19. Port 113 Windows Authentication Service Port

  20. Port 119 NNTP port

  21. Port 123 NTP Time Protocol Port

  22. Port 135 RPC service port

  23. Port 137 NetBIOS service port

  24. Port 138 NetBIOS service port

  25. Port 139 NetBIOS Session Service port

  26. Port 143 IMAP port

  27. Port 161 SNMP port

  28. Port 162 SNMP Trap port

  29. Port 179 BGP port

  30. Port 389 LDAP port

  31. Port 443 HTTPS port

  32. Port 445 SMB service port

  33. Port 465 SMTPS unofficial standard port

  34. Port 512 rexec port

  35. port 513 rlogin port

  36. Port 514 Syslog port

  37. Port 515 515 TCP port for LPD

  38. Port 520 RIP routing protocol port

  39. Port 554 RTSP port

  40. Port 587 SMTPS official standard port

  41. Port 636 LDAPS port

  42. Port 873 rsync service port

  43. Port 993 IMAP encrypted port

  44. Port 995 POP3 encrypted port

  45. Port 1080 Socks proxy service port

  46. Port 1433 SQL Server port

  47. Port 1521 Oracle port

  48. Port 1701 L2TP port

  49. Port 1723 PPTP port

  50. Port 1812 RADIUS authentication port

  51. Port 1813 RADIUS accounting port

  52. Port 2049 NFS port

  53. Port 2181 zookeeper service port

  54. Port 2375 Docker default port

  55. Port 3306 Mysql port

  56. Port 3389 RDP port

  57. Port 5000 sybase/DB2 database

  58. Port 5432 PostgreSQL port

  59. Port 5631 PCAnywhere data port

  60. Port 5632 PCAnywhere Status Port

  61. Port 5900 VNC port

  62. Port 6379 redis port

  63. Port 6380 redis internal port

  64. Port 7001 weblogic port

  65. Port 8069 Zabbix service port

  66. Port 8080 Tomcat port

  67. port 8848 nacos port

  68. Port 9092 kafka default listening port

  69. Port 9200 ElasticSearch external communication port

  70. Port 9300 ElasticSearch cluster communication port

  71. Port 10050 Zabbix Agent actively sends data

  72. Port 10051 Zabbix Server periodically requests data from the Agent

  73. Port 11211 memcached port

  74. Port 27017 mongodb port

  75. Port 5672 RabbitMQ port

` How to learn hacking & network security

As long as you like my article today, my private network security learning materials will be shared with you for free. Come and see what is available.

1. Learning roadmap

There are a lot of things to learn about attack and defense. I have written down the specific things you need to learn in the road map above. If you can complete them, you will have no problem getting a job or taking on a private job.

2. Video tutorial

Although there are many learning resources on the Internet, they are basically incomplete. This is an Internet security video tutorial I recorded myself. I have accompanying video explanations for every knowledge point in the roadmap above.

The content covers the study of network security laws, network security operations and other security assessments, penetration testing basics, detailed explanations of vulnerabilities, basic computer knowledge, etc. They are all must-know learning contents for getting started with network security.

(They are all packaged into one piece and cannot be expanded one by one. There are more than 300 episodes in total)

Due to limited space, only part of the information is displayed. You need to click on the link below to obtain it.

CSDN gift package: "Hacker & Network Security Introduction & Advanced Learning Resource Package" free sharing

3. Technical documents and e-books

I also compiled the technical documents myself, including my experience and technical points in participating in large-scale network security operations, CTF, and digging SRC vulnerabilities. There are more than 200 e-books. Due to the sensitivity of the content, I will not display them one by one.

Due to limited space, only part of the information is displayed. You need to click on the link below to obtain it.

CSDN gift package: "Hacker & Network Security Introduction & Advanced Learning Resource Package" free sharing

4. Toolkit, interview questions and source code

"If you want to do your job well, you must first sharpen your tools." I have summarized dozens of the most popular hacking tools for everyone. The scope of coverage mainly focuses on information collection, Android hacking tools, automation tools, phishing, etc. Interested students should not miss it.

There is also the case source code and corresponding toolkit mentioned in my video, which you can take away if needed.

Due to limited space, only part of the information is displayed. You need to click on the link below to obtain it.

CSDN gift package: "Hacker & Network Security Introduction & Advanced Learning Resource Package" free sharing

Finally, here are the interview questions about network security that I have compiled over the past few years. If you are looking for a job in network security, they will definitely help you a lot.

These questions are often encountered when interviewing Sangfor, Qi Anxin, Tencent or other major companies. If you have good questions or good insights, please share them.

Reference analysis: Sangfor official website, Qi’anxin official website, Freebuf, csdn, etc.

Content features: Clear organization and graphical representation to make it easier to understand.

Summary of content: Including intranet, operating system, protocol, penetration testing, security service, vulnerability, injection, XSS, CSRF, SSRF, file upload, file download, file inclusion, XXE, logical vulnerability, tools, SQLmap, NMAP, BP, MSF…

Due to limited space, only part of the information is displayed. You need to click on the link below to obtain it.

CSDN gift package: "Hacker & Network Security Introduction & Advanced Learning Resource Package" free sharing

Guess you like

Origin blog.csdn.net/Javachichi/article/details/135236085