Step 1
********
Port are logical address of any protocol another we can call it
dedicated door for each protocol in which all the packets fall in
that box or we can say mailbox for each protocol in which each
protocol packets are dropped and then receiver will open that
packet and read the content which sender has sent.
its nothing but a dedicated sepreate line for packet transmisison for each protocol.
Step 2
********
21 for ftp prtocol
22 for ssh protocol
25 for smtp protocol
53 for dns protocol
67/68 is for udp
80 for http protocol
88 for tcp protocol
143 for Transmission Control Protocol.
389 for LDAP (Lightweight Directory Access Protocol)
443 for https
3389 for RDP remote desktop protocol
Step 3
*********
netstat -a : Displays all connections and listening ports.
netstat -b : Displays the executable involved in creating each connection or listening port.
netstat -n : Displays addresses and port numbers in numerical form.
netstat -o : Displays the owning process ID associated with each connection.
if you have any doubt then please ask me without any hesitation in
the comment section below , if you like my answer then please
thumbs up for the answer , before giving thumbs down please discuss
the question it may possible that we may understand the question
different way and we can edit and change the answers if you argue,
thanks :)
166 Chapter 8: TCP/IP Applications Getting Down to Business The way network communication all those ls...
Six Which of the following options can be used to configure TCP/IP? (Choose all that apply.) APIPA DHCP DNS Static IP addressing You need to install a new Windows 10 machine into Site A with a subnet mask of 255.255.255.224. Which TCP/IP address can you assign to the new Windows 10 machine as a valid host address? 192.168.2.63 Which subnet mask would you utilize if you had a class C network and you wanted to connect 23 branch offices back...
Question 34 A TCP socket contain …………………… that uniquely identifies it on a network TCP ID Port number UDP HTTP ( ) a ( ) b ( ) c ( ) d 2 points Question 35 Mail server port number is usually 8080 80 2525 25 ( ) a ( ) b ( ) c ( ) d 2 points Question 36 TCP Head length indicates ( ) The size of the segment ( ) The capacity of data that...
In this assignment, you design a simple chat room in the form of a network application which uses the services of a TCP/IP computer network. Your design should have a clientserver architecture in which the server is multi-threaded. Then, you need to implement the server-side of the chat-room application in Java (implementing the client-side is optional). The server maintains a list (an ArrayList will work well) of all the active connections. It will listen on a port for a new...
Description: In this assignment, you will be launching a denial of service attack on a web server. We will be using hping3, a command-line oriented network security tool inside Kali Linux (an advanced penetration testing Linux distribution). Setting up the victim machine Download the Windows XP virtual machine with WebGoat server installed, using the following link. We will use this machine as the victim machine and launch a DoS attack on the WebGoat server.https://drive.google.com/open?id=0BwCbaZv8DevUejBPWlNHREFVc2s Open the victim machine and launch...
answer all the questions if you can not, at leaset answer the assigned ones Windoes Firewa has been andard snce Wndrwa XP In Wndows 3P SP2, was anatied by defadt firewll is designed to protect a compuer or netwark by aontroing inbound and oubound tamc Most fiwats operae wih an implit deny phiosophy. In other wonds, al raic is ocked (mpicit deny) untess there is a nde that explicity alows the traic Windws Firewal on Winarws 7 aso uses an...
Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...