![]() |
Insecure Ports https://txgate.io/images/smilies/blind.gif <ul><li>21 FTP: File Transfer Protocol (FTP) sends the username and password from the client to the server.</li> <li>23 TELNET: All information to and from the host on a Telnet connection is sent in plaintext and can be intercepted by an attacker.</li> <li>25 SMTP: Simple Mail Transfer Protocol (SMTP) is the default for sending email messages. Since it is unencrypted, data contained within the emails could be discovered by network sniffing.</li> <li>37 TIME: Time Protocol may be in use by legacy equipment and has mostly been replaced by using port 123 for Network Time Protocol (NTP).</li> <li>53 DNS: Domain Name Service (DNS) is still widely used.</li> <li>80 HTTP: Hyper Text Transfer Protocol (HTTP) is the basis of nearly all web browser traffic on the internet. Information sent via HTTP is not encrypted and is susceptible to sniffing attacks.</li> <li>143 IMAP: Internet Message Access Protocol (IMAP) is a protocol used for retrieving emails. IMAP traffic on port 143 is not encrypted and is susceptible to network sniffing.</li> <li>445 SMB: Server Message Block (SMB) is used by many versions of Windows for accessing files over the network. Files are transmitted unencrypted.</li> <li>389 (LDAP): Lightweight Directory Access Protocol (LDAP) is used to communicate directory information from servers to clients. Since LDAP is not encrypted, it is susceptible to sniffing and manipulation attacks.</li> </ul> Secure Ports https://txgate.io/images/smilies/dirol.gif <ul><li>22 SFTP: Uses encryption to protect user credentials and data packets being transferred.</li> <li>22 SECURE SHELL: Secure Shell (SSH) on port 22 uses encryption to ensure that traffic between the host and terminal is not sent in plaintext format.</li> <li>587 SMTP: The secure alternative is to use port 587 for SMTP using Transport Layer Security (TLS), which will encrypt the data between the mail client and the mail server.</li> <li>123 NTP: NTP on port 123 offers better error-handling capabilities, reducing the likelihood of unexpected errors.</li> <li>853 DoT: However, using DNS over TLS (DoT) on port 853 protects DNS information from being modified in transit.</li> <li>443 HTTPS: HTTPS using TLS encryption is preferred, as it protects the data in transit between the server and the browser.</li> <li>993 IMAP: The secure alternative is to use port 993 for IMAP, which adds SSL/TLS security to encrypt the data between the mail client and the mail server.</li> <li>2049 NFS: Network File System (NFS). Although NFS can use encryption, it is recommended that NFS not be allowed through firewalls.</li> <li>636 LDAPS: Lightweight Directory Access Protocol Secure (LDAPS) adds SSL/TLS security to protect information while it is in transit.</li> </ul> </img> |
All times are GMT. The time now is 05:57 PM. |
Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2025, vBulletin Solutions, Inc.