Network ports
Assessing the network infrastructure for the identification of critical vulnerabilities has always been a challenging and time-consuming process. Thus, we have fine-tuned a small list of known network ports with their respective services in order to help penetration testers quickly map through potential vulnerable services (TCP/UDP ports 1 to 65,535) using Kali Linux tools.
To get a complete and a more up-to-date list of all network ports, visit http://www.iana.org/assignments/port-numbers.
However, bear in mind that sometimes the applications and services are configured to run on different ports than the default ones, shown as follows:
Service |
Port |
Protocol |
---|---|---|
Echo |
7 |
TCP/UDP |
Character Generator (CHARGEN) |
19 |
TCP/UDP |
FTP data transfer |
20 |
TCP |
FTP control |
21 |
TCP |
SSH |
22 |
TCP |
Telnet |
23 |
TCP |
SMTP |
25 |
TCP |
WHOIS |
43 |
TCP |
TACACS |
49 |
TCP/UDP |
DNS |
53 |
TCP/UDP |
Bootstrap Protocol (BOOTP) server |
67 |
UDP |
Bootstrap Protocol (BOOTP) client |
68 |
UDP |
TFTP |
69 |
UDP |
HTTP... |