Skip to Content
Network Security Assessment, 3rd Edition
book

Network Security Assessment, 3rd Edition

by Chris McNab
December 2016
Beginner content levelBeginner
494 pages
12h 34m
English
O'Reilly Media, Inc.
Content preview from Network Security Assessment, 3rd Edition

Chapter 8. Assessing Microsoft Services

This chapter focuses on proprietary Microsoft protocols that support file sharing, printing, email, and other functions within Windows networks. Table 8-1 lists the common static ports used by the protocols. Microsoft RPC services use dynamic high ports, as orchestrated by the RPC locator service. Open protocols used by Windows include DNS, Kerberos, and LDAP, as listed in Table 8-2 and covered in Chapter 7.

Table 8-1. Microsoft services using proprietary protocols
Port Protocol Name Description
TCP UDP
135

loc-srv RPC locator service
137

netbios-ns NetBIOS name service
138

netbios-dgm NetBIOS datagram service
139

netbios-ssn NetBIOS session service
445

microsoft-ds SMB Direct service
3389

microsoft-rdp Remote Desktop Protocol
Table 8-2. Microsoft services using open protocols
Port Protocol Name Description
TCP UDP
53

domain DNS service
88

kerberos Kerberos authentication service
123

ntp Network Time Protocol
389

ldap LDAP
464

kpasswd Kerberos password service
636

ldaps LDAP (TLS)
3268

globalcat Microsoft Global Catalog LDAP
3269

globalcats Microsoft Global Catalog LDAP (TLS)

These protocols support functions including the following:

  • Authentication via Kerberos

  • Directory service through LDAP and Global Catalog

  • Name resolution via DNS (e.g., SRV records defining service locations)

  • Legacy name ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Cybersecurity – Attack and Defense Strategies - Second Edition

Cybersecurity – Attack and Defense Strategies - Second Edition

Yuri Diogenes, Dr. Erdal Ozkaya
Applied Network Security Monitoring

Applied Network Security Monitoring

Chris Sanders, Jason Smith
Network Protocols for Security Professionals

Network Protocols for Security Professionals

Yoram Orzach, Deepanshu Khanna
Cyber Security and Network Security

Cyber Security and Network Security

Sabyasachi Pramanik, Debabrata Samanta, M. Vinay, Abhijit Guha

Publisher Resources

ISBN: 9781491911044Supplemental ContentErrata Page