Hacking: A 101 Hacking Guide (Tech Geek Book 3) by Alex Benjamin
Author:Alex Benjamin [Benjamin, Alex]
Language: eng
Format: epub
Published: 2015-06-20T07:00:00+00:00
Chapter 6: Accessing Ports
Ports allow multiple services (remember the term daemon?) to share a single physical connection for communication. The best example would be allowing access to the internet. Ports are associated with IP addresses and have a port number to identify them.
Let’s look at an example of how these ports work by looking at email. An email server that is sending and receiving email needs two services: one for sending and receiving messages from other servers, and one for allows users to retrieve their own personal email from the server. The first service is called SMTP, which stands for Simple Mail Transfer Protocol. It usually uses Port 25 to watch for requests to either send mail or receive mail. The second service is usually either the Post Office Protocol (POP) or Internet Message Access Protocol (IMAP). Whatever software you use for sending and receiving email uses one of these services to retrieve your email from the server. The POP service commonly uses Port 110.
The only way to attack a service, such as POP, is through the port they are using. You can think of it as a piping system, where the port acts as a valve. If the port is not being used, it is closed and nothing can get through; if the port is open, then it may be vulnerable to attack. If you aren’t using a port, it should be closed.
We are going to talk about how hackers use ports to gain access to your system, but first let’s go over some acronyms and definitions.
DNS: Domain Name Server, translates names into IP addresses
FTP: File Transfer Protocol, used to transfer files from one host to another
HTTP: HyperText Transfer Protocol
HTTPS: HTTP over SSL (see definition below)
POP3: Post Office Protocol version 3, used to retrieve email from a mail server
RPC: Remote Procedure Call, allows a program on one computer to run a program on the server
SSH: Secure Shell, used to login to another computer over the network, move files between computers, and execute commands remotely
SSL: Secure Sockets Layer, uses two keys to encrypt data shared via the internet
SMTP: Simple Mail Transfer Protocol, used to send email messages from one server to another, or from a mail client to a mail server
TCP: Transmission Control Protocol, allows two hosts to make a connection and exchange data
UDP: User Datagram Protocol, primarily used for broadcasting messages over a network
Ports that are commonly hacked include…
TCP port 21 - FTP
TCP port 22–SSH
TCP port 23 - telnet
TCP port 25 - SMTP
TCP and UDP port 53 - DNS
TCP port 443 - HTTP and HTTPS
TCP port 110 - POP3
TCP and UDP port 135 - Windows RPC
TCP and UDP ports 137–139 - Windows NetBIOS over TCP/IP
TCP port 1433 and UDP port 1434–Microsoft SQL Server
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7775)
Grails in Action by Glen Smith Peter Ledbrook(7693)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6409)
Kotlin in Action by Dmitry Jemerov(5062)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3769)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3327)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(3085)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2867)
The Art Of Deception by Kevin Mitnick(2602)
Drugs Unlimited by Mike Power(2465)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2310)
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Walter Isaacson(2297)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2261)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2190)
JavaScript by Example by S Dani Akash(2134)
A Blueprint for Production-Ready Web Applications: Leverage industry best practices to create complete web apps with Python, TypeScript, and AWS by Dr. Philip Jones(2116)
DarkMarket by Misha Glenny(2083)
Wireless Hacking 101 by Karina Astudillo(2075)
Full-Stack React Projects by Shama Hoque(1990)
