2.1 Ports and Protocols
In this section, it is definitely important to have a strong grasp on some of the most commonly used ports. For example, you’ll want to know that port 80 is the Hypertext Transfer Protocol (HTTP) port, that port 15 is Netstat, port 25 is SMTP, port 110 is POP3, port 443 is HTTPS, and so on. Some other port numbers you want to familiarize yourself with are:
· Port 21 – FTP
· Port 22 – SSH
· Port 23 – Telnet
· Port 53 – DNS
· Port 161/162- SNMP
However, just knowing your port numbers and their functions isn’t enough. You want to be able to differentiate between all of them, know the threats that they face, and then how to mitigate these threats.
Section 2.1 also requires you know the difference between network design elements and components as well as the large variety of threats that can be used to exploit open ports and protocols. For instance, you’ll want to know what a DDOS attack is, how it is done, the damage it does, and what port it exploits to be successful. Also focus on knowing these other attacks:
· DOS
o Smurfing
o Fraggle
o Land
o SYN flood
o Ping flood
· TCP/IP hijacking
· Spoofing
· DOS
· DNS poisoning
· Null sessions
· Replay
Be sure to note how these threats pose security issues to a network and how networks can be patched and configured in a way that the network isn’t as vulnerable. You’ll also want to know how to protect your network in the case of a successful attack.
Even though some companies worry very little about these types of attacks, the fact is that any server or website on the internet can easily become a victim of one. For example, DOS and DDOS attacks are extremely popular these days, yet companies still neglect to have the proper configuration and mitigation techniques to avert these types of attacks. For instance, a main ISP in Myanmar has apparently been suffering from constant DDOS attacks since October. Also recently in the news is a group known as “Anonymous” who have been DDOS attacking various IRAA websites.