Living with Linux in the Industrial World by Unknown
Author:Unknown
Language: eng
Format: epub
Published: 2013-01-07T07:35:22+00:00
Chapter 4: Port Checking
Linux has a lot of tools to check which ports are open, the most common is nmap which is a command line tool, but also exist a Graphical frontEnd for it if the user prefer that way.
1)Basic understanding of TCP and UDP protocol
2)Techniques to find out which process uses which port number, directory, owner, etc
3)Overview of rootkits to find out the processes that are really running
Understanding of TCP and UDP Ports
As you know every computer or device on the Internet must have a unique number assigned to it called the IP address. This IP address is used to recognize your particular computer out of the millions of other computers connected to the Internet. When information is sent over the Internet to your computer how does your computer accept that information? It accepts that information by using TCP or UDP ports.
An easy way to understand ports is to imagine your IP address is a cable box and the ports are the different channels on that cable box. The cable company knows how to send cable to your cable box based upon a unique serial number associated with that box (IP Address), and then you receive the individual shows on different channels (Ports).
Ports work the same way. You have an IP address, and then many ports on that IP address. You can have a total of 65,535 TCP Ports and another 65,535 UDP ports. When a program on your computer sends or receives data over the Internet it sends that data to an ip address and a specific port on the remote computer, and receives the data on a usually random port on its own computer. If it uses the TCP protocol to send and receive the data then it will connect and bind itself to a TCP port. If it uses the UDP protocol to send and receive data, it will use a UDP port. Figure 1, below, is a represenation of an IP address split into its many TCP and UDP ports. Note that once an application binds itself to a particular port, that port can not be used by any other application. It is first come, first served.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Blogging & Blogs | eBay |
E-Commerce | Hacking |
Online Searching | Podcasts & Webcasts |
Search Engine Optimization | Social Media |
Social Media for Business | Web Browsers |
Web Marketing |
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7411)
Grails in Action by Glen Smith Peter Ledbrook(7303)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(5968)
Kotlin in Action by Dmitry Jemerov(4653)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3034)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(2844)
WordPress Plugin Development Cookbook by Yannick Lefebvre(2625)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2518)
The Art Of Deception by Kevin Mitnick(2303)
Drugs Unlimited by Mike Power(2195)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2103)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2068)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2022)
JavaScript by Example by S Dani Akash(1951)
Wireless Hacking 101 by Karina Astudillo(1852)
DarkMarket by Misha Glenny(1849)
Full-Stack React Projects by Shama Hoque(1777)
Social Selling Mastery by Jamie Shanks(1752)
Hack and HHVM by Owen Yamauchi(1680)