SlideShare a Scribd company logo
1 of 20
H I N D A L F A L A S I
1 0 A G
20 COMMON PORTS AND
THEIR PURPOSES
WHAT ARE PORTS?
• Most network protocols involve transferring data over
one or more ports, which are numbered resources on a
computer.
• The port number identifies the protocol being used.
PORT 1
TCP
Port Service Multiplexer
(TCPMUX)
PORT 5
Remote Job Entry (RJE)
PORT 7
ECHO
PORT 18
Message Send Protocol
(MSP)
PORT 20, 21
Protocol Common Server
Program(s)
Explanation
FTP oftpd,ProFTPD, Pure-
FTPd, vsftpd
FTP is an old protocol for
transferring files over a
network. It supports both
anonymous and
password-mediated
access.
PORT 22
Protocol Common Server
Program(s)
Explanation
SSH OpenSSH SSH is an encrypted
remote access tool. It
also supports file
transfers and encrypting
other protocols.
PORT 23
Protocol Common Server
Program(s)
Explanation
Telnet telnetd an old unencrypted
remote login protocol,
that can be a useful
network diagnostic tool.
PORT 25
Protocol Common Server
Program(s)
Explanation
SMTP Exim, Postfix, qmail,
sendmail
SMTP is the main
protocol for moving email
on the Internet.
PORT 42
Protocol Common Server
Program(s)
Explanation
DNS dnsmasq, named DNS enables computers
to look up an IP address
by providing a hostname,
or vice-versa.
PORT 67
Protocol Common Server
Program(s)
Explanation
BOOTP, DHCP dnsmasq, dhcpd BOOTP and DHCP
enable a computer on a
local network to help
automatically configure
other computers to use a
network.
PORT 80
Protocol Common Server
Program(s)
Explanation
HTTP Apache (HTTP) is the basis of
the World Wide Web
(WWW, or Web).
PORT 109, 110
Protocol Common Server
Program(s)
Explanation
POP2 and POP3 Courier, Cyrus, IMAP,
Dovecot, UW IMAP
This protocol enables a
recipient to initiate an
email transfer
PORT 118
Protocol Common Server
Program(s)
Explanation
SQL MySQL, PostgreSQL (SQL) is a network-
enabled database inter-
face language.
PORT 137, 139
Protocol Common Server
Program(s)
Explanation
SMB/CIFS Samba Microsoft uses the
(SMB)/ (CIFS) protocols
for file and printer
sharing, and Samba
implements these
protocols in Linux.
PORT 143, 200
Protocol Common Server
Program(s)
Explanation
IMAP Courier, Cyrus, IMAP, D IMAP makes it easier for
recipients to permanently
store and manage email
on the server computer
PORT 389
Protocol Common Server
Program(s)
Explanation
LDAP OpenLDAP a network protocol for
accessing directories,
which in this context are
a type of database.
PORT 443
Protocol Common Server
Program(s)
Explanation
HTTPS Apache This protocol is a secure
(encrypted) variant of
HTTP.
PORT 2049
Protocol Common Server
Program(s)
Explanation
NFS NFS (NFS) is a protocol, and
a server of the same
name, for file sharing
between Unix and Unix-
like OSs.

More Related Content

What's hot

Meeting 7 : host configuration: dhcp
Meeting 7 : host configuration: dhcpMeeting 7 : host configuration: dhcp
Meeting 7 : host configuration: dhcpSyaiful Ahdan
 
Nessus scan report using the defualt scan policy - Tareq Hanaysha
Nessus scan report using the defualt scan policy - Tareq HanayshaNessus scan report using the defualt scan policy - Tareq Hanaysha
Nessus scan report using the defualt scan policy - Tareq HanayshaHanaysha
 
Lec 2(intoduction of computer networkes)
Lec 2(intoduction of computer networkes)Lec 2(intoduction of computer networkes)
Lec 2(intoduction of computer networkes)maamir farooq
 
Tftp client server communication
Tftp client server communicationTftp client server communication
Tftp client server communicationUday Sharma
 
Lec 12(Transport Layer)
Lec 12(Transport Layer)Lec 12(Transport Layer)
Lec 12(Transport Layer)maamir farooq
 
ACME and mod_md: tls certificates made easy
ACME and mod_md: tls certificates made easyACME and mod_md: tls certificates made easy
ACME and mod_md: tls certificates made easyGiovanni Bechis
 
Ipv6 cheat sheet
Ipv6 cheat sheetIpv6 cheat sheet
Ipv6 cheat sheetSwarup Hait
 
At640 datasheet-d20110704 en
At640 datasheet-d20110704 enAt640 datasheet-d20110704 en
At640 datasheet-d20110704 enTran Thanh
 
Chap 13 stream control transmission protocol
Chap 13 stream control transmission protocolChap 13 stream control transmission protocol
Chap 13 stream control transmission protocolNoctorous Jamal
 

What's hot (20)

Meeting 7 : host configuration: dhcp
Meeting 7 : host configuration: dhcpMeeting 7 : host configuration: dhcp
Meeting 7 : host configuration: dhcp
 
Nessus scan report using the defualt scan policy - Tareq Hanaysha
Nessus scan report using the defualt scan policy - Tareq HanayshaNessus scan report using the defualt scan policy - Tareq Hanaysha
Nessus scan report using the defualt scan policy - Tareq Hanaysha
 
Lec 2(intoduction of computer networkes)
Lec 2(intoduction of computer networkes)Lec 2(intoduction of computer networkes)
Lec 2(intoduction of computer networkes)
 
Tftp client server communication
Tftp client server communicationTftp client server communication
Tftp client server communication
 
FTP & TFTP
FTP & TFTPFTP & TFTP
FTP & TFTP
 
Ch21
Ch21Ch21
Ch21
 
Lec 12(Transport Layer)
Lec 12(Transport Layer)Lec 12(Transport Layer)
Lec 12(Transport Layer)
 
Ftp tftp
Ftp tftpFtp tftp
Ftp tftp
 
Netkitmig
NetkitmigNetkitmig
Netkitmig
 
Fit project
Fit projectFit project
Fit project
 
CCNA CHAPTER 16 BY jetarvind kumar madhukar
CCNA CHAPTER 16 BY jetarvind kumar madhukarCCNA CHAPTER 16 BY jetarvind kumar madhukar
CCNA CHAPTER 16 BY jetarvind kumar madhukar
 
TCP vs UDP / Sumiet23
TCP vs UDP / Sumiet23TCP vs UDP / Sumiet23
TCP vs UDP / Sumiet23
 
6 networking
6 networking6 networking
6 networking
 
Udp
UdpUdp
Udp
 
Bt0076 tcp ip
Bt0076  tcp ipBt0076  tcp ip
Bt0076 tcp ip
 
ACME and mod_md: tls certificates made easy
ACME and mod_md: tls certificates made easyACME and mod_md: tls certificates made easy
ACME and mod_md: tls certificates made easy
 
#1 (TCPvs. UDP)
#1 (TCPvs. UDP)#1 (TCPvs. UDP)
#1 (TCPvs. UDP)
 
Ipv6 cheat sheet
Ipv6 cheat sheetIpv6 cheat sheet
Ipv6 cheat sheet
 
At640 datasheet-d20110704 en
At640 datasheet-d20110704 enAt640 datasheet-d20110704 en
At640 datasheet-d20110704 en
 
Chap 13 stream control transmission protocol
Chap 13 stream control transmission protocolChap 13 stream control transmission protocol
Chap 13 stream control transmission protocol
 

Similar to Ports

Ports and services
Ports and servicesPorts and services
Ports and servicesIlan Mindel
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocolssiva rama
 
TCP RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
TCP  RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdfTCP  RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
TCP RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdfanjaniar7gallery
 
CCNA Interview.pdf
CCNA Interview.pdfCCNA Interview.pdf
CCNA Interview.pdfhoang971
 
Tcp and introduction to protocol
Tcp and introduction to protocolTcp and introduction to protocol
Tcp and introduction to protocolSripati Mahapatra
 
Tcpandintroductiontoprotocol 150618054958-lva1-app6892
Tcpandintroductiontoprotocol 150618054958-lva1-app6892Tcpandintroductiontoprotocol 150618054958-lva1-app6892
Tcpandintroductiontoprotocol 150618054958-lva1-app6892Saumendra Pradhan
 
file transfer and access utilities
file transfer and access utilitiesfile transfer and access utilities
file transfer and access utilitiestumetr1
 
Transport Layer Port or TCP/IP & UDP Port
Transport Layer Port or TCP/IP & UDP PortTransport Layer Port or TCP/IP & UDP Port
Transport Layer Port or TCP/IP & UDP PortNetwax Lab
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network priya sehgal
 
Application layer and protocols of application layer
Application layer and protocols of application layerApplication layer and protocols of application layer
Application layer and protocols of application layerTahmina Shopna
 
File Transfer Protocol (FTP)
File Transfer Protocol (FTP)File Transfer Protocol (FTP)
File Transfer Protocol (FTP)AxelXrest
 
ETE405-lec7.pptx
ETE405-lec7.pptxETE405-lec7.pptx
ETE405-lec7.pptxmashiur
 
OPEN STANDARD INTERCONNECTION (OSI) LAYERS
OPEN STANDARD INTERCONNECTION (OSI) LAYERSOPEN STANDARD INTERCONNECTION (OSI) LAYERS
OPEN STANDARD INTERCONNECTION (OSI) LAYERSBikash Bhagat
 
ETE405-lec7.ppt
ETE405-lec7.pptETE405-lec7.ppt
ETE405-lec7.pptmashiur
 
Different types of ports
Different types of portsDifferent types of ports
Different types of portsalmuhairi2000
 

Similar to Ports (20)

Ports and services
Ports and servicesPorts and services
Ports and services
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
 
Basic to advance protocols
Basic to advance protocolsBasic to advance protocols
Basic to advance protocols
 
Ip
IpIp
Ip
 
TCP RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
TCP  RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdfTCP  RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
TCP RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
 
CCNA Interview.pdf
CCNA Interview.pdfCCNA Interview.pdf
CCNA Interview.pdf
 
Tcp and introduction to protocol
Tcp and introduction to protocolTcp and introduction to protocol
Tcp and introduction to protocol
 
Tcpandintroductiontoprotocol 150618054958-lva1-app6892
Tcpandintroductiontoprotocol 150618054958-lva1-app6892Tcpandintroductiontoprotocol 150618054958-lva1-app6892
Tcpandintroductiontoprotocol 150618054958-lva1-app6892
 
file transfer and access utilities
file transfer and access utilitiesfile transfer and access utilities
file transfer and access utilities
 
Transport Layer Port or TCP/IP & UDP Port
Transport Layer Port or TCP/IP & UDP PortTransport Layer Port or TCP/IP & UDP Port
Transport Layer Port or TCP/IP & UDP Port
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
 
Deeps
DeepsDeeps
Deeps
 
Application layer and protocols of application layer
Application layer and protocols of application layerApplication layer and protocols of application layer
Application layer and protocols of application layer
 
Hardware8
Hardware8Hardware8
Hardware8
 
File Transfer Protocol (FTP)
File Transfer Protocol (FTP)File Transfer Protocol (FTP)
File Transfer Protocol (FTP)
 
ETE405-lec7.pptx
ETE405-lec7.pptxETE405-lec7.pptx
ETE405-lec7.pptx
 
OPEN STANDARD INTERCONNECTION (OSI) LAYERS
OPEN STANDARD INTERCONNECTION (OSI) LAYERSOPEN STANDARD INTERCONNECTION (OSI) LAYERS
OPEN STANDARD INTERCONNECTION (OSI) LAYERS
 
ETE405-lec7.ppt
ETE405-lec7.pptETE405-lec7.ppt
ETE405-lec7.ppt
 
Different types of ports
Different types of portsDifferent types of ports
Different types of ports
 

More from hindalfalasi

More from hindalfalasi (6)

FSF
FSFFSF
FSF
 
FSF Philosophy
FSF PhilosophyFSF Philosophy
FSF Philosophy
 
Desktop environments
Desktop environmentsDesktop environments
Desktop environments
 
Princples and Philosophy
Princples and PhilosophyPrincples and Philosophy
Princples and Philosophy
 
Lg watch vs Apple watch
Lg watch vs Apple watchLg watch vs Apple watch
Lg watch vs Apple watch
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
 

Recently uploaded

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

Ports

  • 1. H I N D A L F A L A S I 1 0 A G 20 COMMON PORTS AND THEIR PURPOSES
  • 2. WHAT ARE PORTS? • Most network protocols involve transferring data over one or more ports, which are numbered resources on a computer. • The port number identifies the protocol being used.
  • 3. PORT 1 TCP Port Service Multiplexer (TCPMUX)
  • 4. PORT 5 Remote Job Entry (RJE)
  • 6. PORT 18 Message Send Protocol (MSP)
  • 7. PORT 20, 21 Protocol Common Server Program(s) Explanation FTP oftpd,ProFTPD, Pure- FTPd, vsftpd FTP is an old protocol for transferring files over a network. It supports both anonymous and password-mediated access.
  • 8. PORT 22 Protocol Common Server Program(s) Explanation SSH OpenSSH SSH is an encrypted remote access tool. It also supports file transfers and encrypting other protocols.
  • 9. PORT 23 Protocol Common Server Program(s) Explanation Telnet telnetd an old unencrypted remote login protocol, that can be a useful network diagnostic tool.
  • 10. PORT 25 Protocol Common Server Program(s) Explanation SMTP Exim, Postfix, qmail, sendmail SMTP is the main protocol for moving email on the Internet.
  • 11. PORT 42 Protocol Common Server Program(s) Explanation DNS dnsmasq, named DNS enables computers to look up an IP address by providing a hostname, or vice-versa.
  • 12. PORT 67 Protocol Common Server Program(s) Explanation BOOTP, DHCP dnsmasq, dhcpd BOOTP and DHCP enable a computer on a local network to help automatically configure other computers to use a network.
  • 13. PORT 80 Protocol Common Server Program(s) Explanation HTTP Apache (HTTP) is the basis of the World Wide Web (WWW, or Web).
  • 14. PORT 109, 110 Protocol Common Server Program(s) Explanation POP2 and POP3 Courier, Cyrus, IMAP, Dovecot, UW IMAP This protocol enables a recipient to initiate an email transfer
  • 15. PORT 118 Protocol Common Server Program(s) Explanation SQL MySQL, PostgreSQL (SQL) is a network- enabled database inter- face language.
  • 16. PORT 137, 139 Protocol Common Server Program(s) Explanation SMB/CIFS Samba Microsoft uses the (SMB)/ (CIFS) protocols for file and printer sharing, and Samba implements these protocols in Linux.
  • 17. PORT 143, 200 Protocol Common Server Program(s) Explanation IMAP Courier, Cyrus, IMAP, D IMAP makes it easier for recipients to permanently store and manage email on the server computer
  • 18. PORT 389 Protocol Common Server Program(s) Explanation LDAP OpenLDAP a network protocol for accessing directories, which in this context are a type of database.
  • 19. PORT 443 Protocol Common Server Program(s) Explanation HTTPS Apache This protocol is a secure (encrypted) variant of HTTP.
  • 20. PORT 2049 Protocol Common Server Program(s) Explanation NFS NFS (NFS) is a protocol, and a server of the same name, for file sharing between Unix and Unix- like OSs.