Posts by ISeeTWizard

    There are some default Ports used when working on a network/server but most of these ports exists in a default way and a secure way. Here are some essential ports listed with it's default number and it's secured number.


    Insecure Port

    Protocol

    Description

    Secure Port

    Protocol

    Description

    21

    FTP

    File Transfer Protocol (FTP) sends the username and password using plaintext from the client to the server.

    22

    SFTP

    Uses encryption to protect the user credentials and packet of data being transferred.

    23

    Telnet

    All information to & from the host on a telnet connection is sent in plaintext & cand be intercepted by an attacker.

    22

    Secure Shell

    Secure Shell (SSH) on port 22 uses encryption to ensure that traffic between the host and terminal is not sent in plaintext format.

    25

    SMTP

    Simple Mail Transfer Protocol (SMTP) is the default for sending email messages. Since it is unencrypted, data contained within the emails could be discovered by network sniffing.

    587

    SMTP

    The secure alternative is to use port 587 for SMTP using Transport Layer Security (TLS) which will encrypt the data between the mail client and the mail server.

    37

    Time

    Time Protocol may be in use by legacy equipment and has mostly been replaced by using port 123 for Network Time Protocol (NTP).

    123

    NTP

    NTP on port 123 offers between errorhandling capabilities, which reduces the likelihood of unexpected errors.

    53

    DNS

    Domain Name Service (DNS) is still used widely.

    853

    DoT

    However using DNS over TLS (DoT) on port 853 protects DNS information from being modified in transit.

    80

    HTTP

    Hyper Text Transfer Protocol (HTTP) is the basis of nearly all web browser traffic on the internet. Information sent via HTTP is not encrypted and is susceptible to sniffing attacks.

    443

    HTTPS

    HTTPS using TLS encryption is preferred as it protects the data in transit between the server and the browser.

    143

    IMAP

    Internet Message Access Protocol (IMAP) is a protocol used for retrieving emails. IMAP traffic on port 142 is not encrypted and susceptible to network sniffing.

    993

    IMAP

    The secure alterative is to use port 993 for IMAP which adds SSL/TLS security to encrypt the data between the mail client and the mail server.

    445

    SMB

    Server Message Block (SMB) is used by many versions of Windows for accessing files over the network. Files are transmitted unencrypted.

    2049

    NFS

    Network File System (NFS). Although NDS can use encryption it is recommended that NFS not be allowed through firewalls either.

    389

    LDAP

    Lightweight Directory Access Portocol (LDAP) is used to communicate directory information from servers to clients. Since LDAP is not encrpyted it is susceptible to sniffing and manipulation attacks.

    636

    LDAPS

    Lightweight Directory Access Portocol Secure (LDAPS) adds SSL/TLS LDAPS Security to protect the information while it is in transit.

    Within the network there are many different protocols.

    9 of them are more than essential.


    Short Name

    Long Name

    Description

    HTTP

    Hypertext Transfer Protocol

    This is how web pages are requested and delivered on the internet.

    HTTPS

    Hypertext Transfer Protocol Secure

    It's like HTTP but with added security for safer data transfer.

    FTP

    File Transfer Protocol

    It's used to send and receive files over the internet.

    TCP

    Transmission Control Protocol

    It ensures that data sent over the internet arrives intact.

    IP

    Internet Protocol

    It provides addresses for devices on the internet.

    UDP

    User Datagram Protocol

    It's like TCP but faster and less concerned with data integrity.

    SMTP

    Simple Mail Transfer Protocol

    It's used for sending emails between servers.

    SSH

    Secure Shell

    It's a secure way to access and control remote computers.

    IMAP

    Internet Message Access Protocol

    Allow users to access email messages stored on a remote mail server.

    No.

    Layer

    Description

    Device

    Implementations
    Protocols

    7

    Application

    Provides services directly to user applications.
    Identifies communication partners, identifies quality of service, considers user authentication and privacy and determines if adequate ressources are present.

    Gateway

    SMB
    HTTP
    SMTP
    FTP
    SNMP
    Telnet
    AppleTalk

    6

    Presentation

    Performs data transformations and services including formatting, compression and encryption services to provide a common interface for user applications.

    Gateway
    Redirectors

    HTTP
    FTP
    Telnet
    SMTP
    AFP
    TDI

    5

    Session

    Establishes, manages and terminates connections between applications at each end.
    Allows 2 applications to communicate over a network by opening a sessions and synchronizing the involved computers.

    Gateway

    NetBEUI
    TCP
    UDP
    SPX

    4

    Transport

    Provides transparent transfer of data between end systems by insulating layers 5-7 from complexities of layers 1-3.
    Responsible for end to end error recovery and flow control and ensures complete data transfer.

    Gateway

    IP
    IPX
    NWLink
    NetBEUI

    3

    Network

    Establishes, maintains and terminates network connections.
    Handles traffic management including addressing, routing, switching, forwarding, local paths and virtual circuits, error handling, congestion control and packet sequencing.

    Router
    Brouter

    IP
    IPX
    NWLink
    NetBEUI

    2

    Data Link

    Divided into two sub-layers:
    The Media Access Control (MAC) sub layer controls how a networked computer gains access to the data and permission to transmit it
    The Logical Link Control (LLC) sub layer controls frame synchronization, flow control and error checking.

    Switch
    Bridge
    Router

    Ethernet
    PPP
    HDLC

    1

    Physical

    Controls transmission of the bit stream data over the physical medium.
    Standards for this layer address transmission at the electrical and menchanical level including signal voltage swing, voltage duration, etc.

    Multiplexer
    Repeater

    Ethernet
    Token Ring
    FDDI

    The OSI Layer should be commonly known in the world of ICT but did you know what attack targets what layer?

    Here a table to clarify this...


    LayersAttacks
    7ApplicationExploit
    6PresentationPhishing
    5SessionHijacking
    XSS Attacks / Sessions Side Jacking / Malware
    4TransportReconnaissance / DoS (Denial-of-Service)
    TCP Session Hijack / Fraggle / Syn Flood / Land Attacks
    3NetworkMan in the Middle
    Smurf Attack / Ping of Death / Teardrop
    2Data LinkSpoofing
    MAC Spoofing / MAC Flooding / VLAN Hopping
    1PhysicalSniffing

    Information and communications technology (ICT) is an extensional term for information technology (IT) that stresses the role of unified communications and the integration of telecommunications (telephone lines and wireless signals) and computers, as well as necessary enterprise software, middleware, storage and audiovisual, that enable users to access, store, transmit, understand and manipulate information.

    ICT is also used to refer to the convergence of audiovisuals and telephone networks with computer networks through a single cabling or link system. There are large economic incentives to merge the telephone networks with the computer network system using a single unified system of cabling, signal distribution, and management. ICT is an umbrella term that includes any communication device, encompassing radio, television, cell phones, computer and network hardware, satellite systems and so on, as well as the various services and appliances with them such as video conferencing and distance learning. ICT also includes analog technology, such as paper communication, and any mode that transmits communication.

    ICT is a broad subject and the concepts are evolving. It covers any product that will store, retrieve, manipulate, process, transmit, or receive information electronically in a digital form (e.g., personal computers including smartphones, digital television, email, or robots). Skills Framework for the Information Age is one of many models for describing and managing competencies for ICT professionals in the 21st century.