O'Reilly logo

BackTrack 4: Assuring Security by Penetration Testing by Shakeel Ali, Tedi Heriyanto

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Network ports

Assessing the network infrastructure for the identification of critical vulnerabilities has always been a challenging and time consuming process. Thus, we have fine-tuned a small list of known network ports with their respective services in order to help penetration testers quickly map through potential vulnerable services (TCP/UDP ports 1-65,535) using BackTrack tools. To get a complete and more up-to-date list of all network ports, please visit http://www.iana.org/assignments/port-numbers. However, you should also bear in mind that sometimes the applications and services are configured to run on different ports than the default ones.

Service

Port

Protocol

Echo

7

TCP

Systat

11

TCP

Chargen

19

TCP

Ftp-data

21

TCP

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required