SlideShare a Scribd company logo
1 of 20
20 Common Ports and their
Purposes
Maryam Al Ghaith
10AG
What are ports?
 Most network protocols involve
transferring data over one or more
ports, which are numbered resources
on a computer.
 The port number identifies the protocol
being used.
Port 1
TCP
Port Service Multiplexer
(TCPMUX)
Port 5
Remote Job Entry (RJE)
Port 7
ECHO
Port 18
Message Send Protocol
(MSP)
Port 20, 21
Protocol Common Server
Program(s)
Explanation
FTP oftpd,ProFTPD, Pure-
FTPd, vsftpd
FTP is an old protocol
for transferring files
over a network. It
supports both
anonymous and
password-mediated
access.
Port 22
Protocol Common Server
Program(s)
Explanation
SSH OpenSSH SSH is an encrypted
remote access tool. It
also supports file
transfers and
encrypting other
protocols.
Port 23
Protocol Common Server
Program(s)
Explanation
Telnet telnetd an old unencrypted
remote login protocol,
that can be a useful
network diagnostic
tool.
Port 25
Protocol Common Server
Program(s)
Explanation
SMTP Exim, Postfix, qmail,
sendmail
SMTP is the main
protocol for moving
email on the Internet.
Port 42
Protocol Common Server
Program(s)
Explanation
DNS dnsmasq, named DNS enables
computers to look up
an IP address by
providing a hostname,
or vice-versa.
Port 67
Protocol Common Server
Program(s)
Explanation
BOOTP, DHCP dnsmasq, dhcpd BOOTP and DHCP
enable a computer on
a local network to help
automatically
configure other
computers to use a
network.
Port 80
Protocol Common Server
Program(s)
Explanation
HTTP Apache (HTTP) is the basis of
the World Wide Web
(WWW, or Web).
Port 109, 110
Protocol Common Server
Program(s)
Explanation
POP2 and POP3 Courier, Cyrus, IMAP,
Dovecot, UW IMAP
This protocol enables
a recipient to initiate
an email transfer
Port 118
Protocol Common Server
Program(s)
Explanation
SQL MySQL, PostgreSQL (SQL) is a network-
enabled database
inter- face language.
Port 137, 139
Protocol Common Server
Program(s)
Explanation
SMB/CIFS Samba Microsoft uses the
(SMB)/ (CIFS)
protocols for file and
printer sharing, and
Samba implements
these protocols in
Linux.
Port 143, 200
Protocol Common Server
Program(s)
Explanation
IMAP Courier, Cyrus, IMAP,
D
IMAP makes it easier
for recipients to
permanently store and
manage email on the
server computer
Port 389
Protocol Common Server
Program(s)
Explanation
LDAP OpenLDAP a network protocol for
accessing directories,
which in this context
are a type of
database.
Port 443
Protocol Common Server
Program(s)
Explanation
HTTPS Apache This protocol is a
secure (encrypted)
variant of HTTP.
Port 2049
Protocol Common Server
Program(s)
Explanation
NFS NFS (NFS) is a protocol,
and a server of the
same name, for file
sharing between Unix
and Unix-like OSs.

More Related Content

What's hot

Meeting 7 : host configuration: dhcp
Meeting 7 : host configuration: dhcpMeeting 7 : host configuration: dhcp
Meeting 7 : host configuration: dhcp
Syaiful Ahdan
 

What's hot (20)

Meeting 7 : host configuration: dhcp
Meeting 7 : host configuration: dhcpMeeting 7 : host configuration: dhcp
Meeting 7 : host configuration: dhcp
 
Protocols
Protocols Protocols
Protocols
 
Nessus scan report using the defualt scan policy - Tareq Hanaysha
Nessus scan report using the defualt scan policy - Tareq HanayshaNessus scan report using the defualt scan policy - Tareq Hanaysha
Nessus scan report using the defualt scan policy - Tareq Hanaysha
 
Ch21
Ch21Ch21
Ch21
 
#1 (TCPvs. UDP)
#1 (TCPvs. UDP)#1 (TCPvs. UDP)
#1 (TCPvs. UDP)
 
Tftp client server communication
Tftp client server communicationTftp client server communication
Tftp client server communication
 
Puertos tcp & udp
Puertos tcp & udpPuertos tcp & udp
Puertos tcp & udp
 
Netkitmig
NetkitmigNetkitmig
Netkitmig
 
Lec 2(intoduction of computer networkes)
Lec 2(intoduction of computer networkes)Lec 2(intoduction of computer networkes)
Lec 2(intoduction of computer networkes)
 
Introduction to eBPF
Introduction to eBPFIntroduction to eBPF
Introduction to eBPF
 
Internet ports abduilla
Internet ports abduillaInternet ports abduilla
Internet ports abduilla
 
Lec 12(Transport Layer)
Lec 12(Transport Layer)Lec 12(Transport Layer)
Lec 12(Transport Layer)
 
FTP & TFTP
FTP & TFTPFTP & TFTP
FTP & TFTP
 
Socket Programming
Socket ProgrammingSocket Programming
Socket Programming
 
Fit project
Fit projectFit project
Fit project
 
Technical Overview of QUIC
Technical  Overview of QUICTechnical  Overview of QUIC
Technical Overview of QUIC
 
TCP vs UDP / Sumiet23
TCP vs UDP / Sumiet23TCP vs UDP / Sumiet23
TCP vs UDP / Sumiet23
 
Bt0076 tcp ip
Bt0076  tcp ipBt0076  tcp ip
Bt0076 tcp ip
 
Ftp tftp
Ftp tftpFtp tftp
Ftp tftp
 
Linux Bridging: Teaching an old dog new tricks
Linux Bridging: Teaching an old dog new tricksLinux Bridging: Teaching an old dog new tricks
Linux Bridging: Teaching an old dog new tricks
 

Viewers also liked

20 Common Ports and their Purposes
20 Common Ports and their Purposes20 Common Ports and their Purposes
20 Common Ports and their Purposes
ahmadsamer10
 
20 common ports and their purposes
20 common ports and their purposes20 common ports and their purposes
20 common ports and their purposes
aliaalmarri
 
vCenter and ESXi network port communications
vCenter and ESXi network port communicationsvCenter and ESXi network port communications
vCenter and ESXi network port communications
Animesh Dixit
 
How to hack VMware vCenter server in 60 seconds
How to hack VMware vCenter server in 60 secondsHow to hack VMware vCenter server in 60 seconds
How to hack VMware vCenter server in 60 seconds
Positive Hack Days
 
6 network devices
6 network devices6 network devices
6 network devices
Muuluu
 
The 20 Common ports
The 20 Common portsThe 20 Common ports
The 20 Common ports
RKabbaniFTW
 

Viewers also liked (20)

20 Common Ports and their Purposes
20 Common Ports and their Purposes20 Common Ports and their Purposes
20 Common Ports and their Purposes
 
Networking devices
Networking  devices Networking  devices
Networking devices
 
Frame - MAC Address Threats & Vulnerabilities
Frame - MAC Address Threats & VulnerabilitiesFrame - MAC Address Threats & Vulnerabilities
Frame - MAC Address Threats & Vulnerabilities
 
Changelog
ChangelogChangelog
Changelog
 
desktop environments
desktop environments desktop environments
desktop environments
 
Chapter 07 - Transport Layer
Chapter 07 - Transport LayerChapter 07 - Transport Layer
Chapter 07 - Transport Layer
 
20 common ports and their purposes
20 common ports and their purposes20 common ports and their purposes
20 common ports and their purposes
 
vCenter and ESXi network port communications
vCenter and ESXi network port communicationsvCenter and ESXi network port communications
vCenter and ESXi network port communications
 
How to hack VMware vCenter server in 60 seconds
How to hack VMware vCenter server in 60 secondsHow to hack VMware vCenter server in 60 seconds
How to hack VMware vCenter server in 60 seconds
 
Mod4
Mod4Mod4
Mod4
 
Intro to Bits, Bytes, and Storage
Intro to Bits, Bytes, and StorageIntro to Bits, Bytes, and Storage
Intro to Bits, Bytes, and Storage
 
Networking Devices and Networking Topologies
Networking Devices and Networking TopologiesNetworking Devices and Networking Topologies
Networking Devices and Networking Topologies
 
Access Control List 1
Access Control List 1Access Control List 1
Access Control List 1
 
20 common ports and their purposes
20 common ports and their purposes20 common ports and their purposes
20 common ports and their purposes
 
Well known protocols port numbers
Well known  protocols port numbersWell known  protocols port numbers
Well known protocols port numbers
 
6 network devices
6 network devices6 network devices
6 network devices
 
The 20 Common ports
The 20 Common portsThe 20 Common ports
The 20 Common ports
 
Basic To Advanced Networking
Basic To Advanced NetworkingBasic To Advanced Networking
Basic To Advanced Networking
 
Cisco ACL
Cisco ACLCisco ACL
Cisco ACL
 
Reconnaissance & Scanning
Reconnaissance & ScanningReconnaissance & Scanning
Reconnaissance & Scanning
 

Similar to 20 Common Ports and their purposes

ETE405-lec7.pptx
ETE405-lec7.pptxETE405-lec7.pptx
ETE405-lec7.pptx
mashiur
 
OPEN STANDARD INTERCONNECTION (OSI) LAYERS
OPEN STANDARD INTERCONNECTION (OSI) LAYERSOPEN STANDARD INTERCONNECTION (OSI) LAYERS
OPEN STANDARD INTERCONNECTION (OSI) LAYERS
Bikash Bhagat
 
Networking questions
Networking questionsNetworking questions
Networking questions
rajujast
 

Similar to 20 Common Ports and their purposes (20)

Ports and services
Ports and servicesPorts and services
Ports and services
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
 
CCNA Interview.pdf
CCNA Interview.pdfCCNA Interview.pdf
CCNA Interview.pdf
 
6 networking
6 networking6 networking
6 networking
 
Basic to advance protocols
Basic to advance protocolsBasic to advance protocols
Basic to advance protocols
 
Socket Programming TCP:IP PPT.pdf
Socket Programming TCP:IP PPT.pdfSocket Programming TCP:IP PPT.pdf
Socket Programming TCP:IP PPT.pdf
 
Ip
IpIp
Ip
 
Unit 8 Java
Unit 8 JavaUnit 8 Java
Unit 8 Java
 
Transport Layer Port or TCP/IP & UDP Port
Transport Layer Port or TCP/IP & UDP PortTransport Layer Port or TCP/IP & UDP Port
Transport Layer Port or TCP/IP & UDP Port
 
Chapter_3_Networking.ppt
Chapter_3_Networking.pptChapter_3_Networking.ppt
Chapter_3_Networking.ppt
 
Chapter_3_Networking.ppt
Chapter_3_Networking.pptChapter_3_Networking.ppt
Chapter_3_Networking.ppt
 
Web Dev Research
Web Dev ResearchWeb Dev Research
Web Dev Research
 
ETE405-lec7.pptx
ETE405-lec7.pptxETE405-lec7.pptx
ETE405-lec7.pptx
 
Networking in Java
Networking in JavaNetworking in Java
Networking in Java
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
 
File Transfer Protocol (FTP)
File Transfer Protocol (FTP)File Transfer Protocol (FTP)
File Transfer Protocol (FTP)
 
OPEN STANDARD INTERCONNECTION (OSI) LAYERS
OPEN STANDARD INTERCONNECTION (OSI) LAYERSOPEN STANDARD INTERCONNECTION (OSI) LAYERS
OPEN STANDARD INTERCONNECTION (OSI) LAYERS
 
Ccna Imp Guide
Ccna Imp GuideCcna Imp Guide
Ccna Imp Guide
 
Networks faq
Networks faqNetworks faq
Networks faq
 
Networking questions
Networking questionsNetworking questions
Networking questions
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 

Recently uploaded (20)

AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 

20 Common Ports and their purposes

  • 1. 20 Common Ports and their Purposes Maryam Al Ghaith 10AG
  • 2. What are ports?  Most network protocols involve transferring data over one or more ports, which are numbered resources on a computer.  The port number identifies the protocol being used.
  • 3. Port 1 TCP Port Service Multiplexer (TCPMUX)
  • 4. Port 5 Remote Job Entry (RJE)
  • 6. Port 18 Message Send Protocol (MSP)
  • 7. Port 20, 21 Protocol Common Server Program(s) Explanation FTP oftpd,ProFTPD, Pure- FTPd, vsftpd FTP is an old protocol for transferring files over a network. It supports both anonymous and password-mediated access.
  • 8. Port 22 Protocol Common Server Program(s) Explanation SSH OpenSSH SSH is an encrypted remote access tool. It also supports file transfers and encrypting other protocols.
  • 9. Port 23 Protocol Common Server Program(s) Explanation Telnet telnetd an old unencrypted remote login protocol, that can be a useful network diagnostic tool.
  • 10. Port 25 Protocol Common Server Program(s) Explanation SMTP Exim, Postfix, qmail, sendmail SMTP is the main protocol for moving email on the Internet.
  • 11. Port 42 Protocol Common Server Program(s) Explanation DNS dnsmasq, named DNS enables computers to look up an IP address by providing a hostname, or vice-versa.
  • 12. Port 67 Protocol Common Server Program(s) Explanation BOOTP, DHCP dnsmasq, dhcpd BOOTP and DHCP enable a computer on a local network to help automatically configure other computers to use a network.
  • 13. Port 80 Protocol Common Server Program(s) Explanation HTTP Apache (HTTP) is the basis of the World Wide Web (WWW, or Web).
  • 14. Port 109, 110 Protocol Common Server Program(s) Explanation POP2 and POP3 Courier, Cyrus, IMAP, Dovecot, UW IMAP This protocol enables a recipient to initiate an email transfer
  • 15. Port 118 Protocol Common Server Program(s) Explanation SQL MySQL, PostgreSQL (SQL) is a network- enabled database inter- face language.
  • 16. Port 137, 139 Protocol Common Server Program(s) Explanation SMB/CIFS Samba Microsoft uses the (SMB)/ (CIFS) protocols for file and printer sharing, and Samba implements these protocols in Linux.
  • 17. Port 143, 200 Protocol Common Server Program(s) Explanation IMAP Courier, Cyrus, IMAP, D IMAP makes it easier for recipients to permanently store and manage email on the server computer
  • 18. Port 389 Protocol Common Server Program(s) Explanation LDAP OpenLDAP a network protocol for accessing directories, which in this context are a type of database.
  • 19. Port 443 Protocol Common Server Program(s) Explanation HTTPS Apache This protocol is a secure (encrypted) variant of HTTP.
  • 20. Port 2049 Protocol Common Server Program(s) Explanation NFS NFS (NFS) is a protocol, and a server of the same name, for file sharing between Unix and Unix-like OSs.