Question

On the Internet, research the services associated with the open port numbers from the Zenmap scan...

On the Internet, research the services associated with the open port numbers from the Zenmap scan under Contributing Factors. Describe the three services that are open and the purpose of each. Also, discuss whether each service is appropriate for a web server. You must list references from your research and cite them in the sentences of your posts.
0 0
Add a comment Improve this question Transcribed image text
Answer #1

Zenmap provides graphic user interface (GUI) for Nmap. It is free, open source, and supports all major OS platforms, including Windows. Zenmap aims to make Nmap easier to use for beginners while providing advanced features for experienced Nmap users — frequently used scans can be saved as profiles so you could run them repeatedly; scan results can be saved and viewed later; saved scan results can be compared with one another to see how they differ; the results of recent scans are stored in a searchable database; and more.

How To Use Nmap to Scan for Open Ports on your VPS.

Introduction

Networking is an expansive and overwhelming topic for many budding system administrators. There are various layers, protocols, and interfaces, and many tools and utilities that must be mastered to understand them.

This guide will cover the concept of "ports" and will demonstrate how the nmap program can be used to get information about the state of a machine's ports on a network.

Note: This tutorial covers IPv4 security. In Linux, IPv6 security is maintained separately from IPv4. For example, "nmap" scans IPv4 addresses by default but can also scan IPv6 addresses if the proper option is specified (nmap -6).

If your VPS is configured for IPv6, please remember to secure both your IPv4 and IPv6 network interfaces with the appropriate tools. For more information about IPv6 tools, refer to this guide: How To Configure Tools to Use IPv6 on a Linux VPS

What Are Ports?

There are many layers in the OSI networking model. The transport layer is the layer primarily concerned with the communication between different services and applications.

This layer is the main layer that ports are associated with.

Port Terminology

Some knowledge of terminology is needed to understand port configuration. Here are some terms that will help you understand the discussion that will follow:

  • Port: An addressable network location implemented inside of the operating system that helps distinguish traffic destined for different applications or services.

  • Internet Sockets: A file descriptor that specifies an IP address and an associated port number, as well as the transfer protocol that will be used to handle the data.

  • Binding: The process that takes place when an application or service uses an internet socket to handle the data it is inputting and outputting.

  • Listening: A service is said to be "listening" on a port when it is binding to a port/protocol/IP address combination in order to wait for requests from clients of the service.

    Upon receiving a request, it then establishes a connection with the client (when appropriate) using the same port it has been listening on. Because the internet sockets used are associated with a specific client IP address, this does not prevent the server from listening for and serving requests to other clients simultaneously.

  • Port Scanning: Port scanning is the process of attempting to connect to a number of sequential ports, for the purpose of acquiring information about which are open and what services and operating system are behind them.

Common Ports

Ports are specified by a number ranging from 1 to 65535.

  • Many ports below 1024 are associated with services that Linux and Unix-like operating systems consider critical to essential network functions, so you must have root privileges to assign services to them.

  • Ports between 1024 and 49151 are considered "registered". This means that they can be "reserved" (in a very loose sense of the word) for certain services by issuing a request to the IANA (Internet Assigned Numbers Authority). They are not strictly enforced, but they can give a clue as to the possible services running on a certain port.

  • Ports between 49152 and 65535 cannot be registered and are suggested for private use.

Because of the vast number of available ports, you won't ever have to be concerned with the majority of the services that tend to bind to specific ports.

However, there are some ports that are worth knowing due to their ubiquity. The following is only a very incomplete list:

  • 20: FTP data
  • 21: FTP control port
  • 22: SSH
  • 23: Telnet <= Insecure, not recommended for most uses
  • 25: SMTP
  • 43: WHOIS protocol
  • 53: DNS services
  • 67: DHCP server port
  • 68: DHCP client port
  • 80: HTTP traffic <= Normal web traffic
  • 110: POP3 mail port
  • 113: Ident authentication services on IRC networks
  • 143: IMAP mail port
  • 161: SNMP
  • 194: IRC
  • 389: LDAP port
  • 443: HTTPS <= Secure web traffic
  • 587: SMTP <= message submission port
  • 631: CUPS printing daemon port
  • 666: DOOM <= This legacy FPS game actually has its own special port

These are just a few of the services commonly associated with ports. You should be able to find the appropriate ports for the applications you are trying to configure within their respective documentation.

Most services can be configured to use ports other than the default, but you must ensure that both the client and server are configured to use a non-standard port.

You can get a short list of some common ports by typing:

less /etc/services

It will give you a list of common ports and their associated services:

. . .
tcpmux          1/tcp                           # TCP port service multiplexer
echo            7/tcp
echo            7/udp
discard         9/tcp           sink null
discard         9/udp           sink null
systat          11/tcp          users
daytime         13/tcp
daytime         13/udp
netstat         15/tcp
qotd            17/tcp          quote
msp             18/tcp                          # message send protocol
. . .

We will see in the section about nmap how to get a more complete list.

How To Check Your Own Open Ports

There are a number of tools that can be used to scan for open ports.

One that is installed by default on most Linux distributions is netstat.

You can quickly discover which services you are running by issuing the command with the following parameters:

sudo netstat -plunt
Proto Recv-Q Send-Q Local Address           Foreign Address         State       PID/Program name
tcp        0      0 0.0.0.0:22              0.0.0.0:*               LISTEN      785/sshd        
tcp6       0      0 :::22                   :::*                    LISTEN      785/sshd 

This shows the port and listening socket associated with the service and lists both UDP and TCP protocols.

Install Nmap

Part of securing a network involves doing vulnerability testing. This means trying to infiltrate your network and discover weaknesses in the same way that an attacker might.

Out of all of the available tools for this, nmap is perhaps the most common and powerful.

You can install nmap on an Ubuntu or Debian machine by entering:

sudo apt-get update
sudo apt-get install nmap

One of the side benefits of installing this software is an improved port mapping file. You can see a much more extensive association between ports and services by looking in this file:

less /usr/share/nmap/nmap-services
. . .
tcpmux  1/tcp   0.001995        # TCP Port Service Multiplexer [rfc-1078]
tcpmux  1/udp   0.001236        # TCP Port Service Multiplexer
compressnet     2/tcp   0.000013        # Management Utility
compressnet     2/udp   0.001845        # Management Utility
compressnet     3/tcp   0.001242        # Compression Process
compressnet     3/udp   0.001532        # Compression Process
unknown 4/tcp   0.000477
rje     5/udp   0.000593        # Remote Job Entry
unknown 6/tcp   0.000502
echo    7/tcp   0.004855
echo    7/udp   0.024679
echo    7/sctp  0.000000
. . .

Besides having almost 20 thousand lines, this file also has additional fields, such as the third column, which lists the open frequency of that port as discovered during research scans on the internet.

How To Scan Ports with Nmap

Nmap can reveal a lot of information about a host. It can also make system administrators of the target system think that someone has malicious intent. For this reason, only test it on servers that you own or in situations where you've notified the owners.

The nmap creators actually provide a test server located at:

scanme.nmap.org

This, or your own VPS instances are good targets for practicing nmap.

Here are some common operations that can be performed with nmap. We will run them all with sudo privileges to avoid returning partial results for some queries. Some commands may take a long while to complete:

Scan for the host operating system:

sudo nmap -O remote_host

Skip network discovery portion and assume the host is online. This is useful if you get a reply that says "Note: Host seems down" in your other tests. Add this to the other options:

sudo nmap -PN remote_host

Specify a range with "-" or "/24" to scan a number of hosts at once:

sudo nmap -PN xxx.xxx.xxx.xxx-yyy

Scan a network range for available services:

sudo nmap -sP network_address_range

Scan without preforming a reverse DNS lookup on the IP address specified. This should speed up your results in most cases:

sudo nmap -n remote_host

Scan a specific port instead of all common ports:

sudo nmap -p port_number remote_host

To scan for TCP connections, nmap can perform a 3-way handshake (explained below), with the targeted port. Execute it like this:

sudo nmap -sT remote_host

To scan for UDP connections, type:

sudo nmap -sU remote_host

Scan for every TCP and UDP open port:

sudo nmap -n -PN -sT -sU -p- remote_host

A TCP "SYN" scan exploits the way that TCP establishes a connection.

To start a TCP connection, the requesting end sends a "synchronize request" packet to the server. The server then sends a "synchronize acknowledgment" packet back. The original sender then sends back an "acknowledgment" packet back to the server, and a connection is established.

A "SYN" scan, however, drops the connection when the first packet is returned from the server. This is called a "half-open" scan and used to be promoted as a way to surreptitiously scan for ports, since the application associated with that port would not receive the traffic, because the connection is never completed.

This is no longer considered stealthy with the adoption of more advanced firewalls and the flagging of incomplete SYN request in many configurations.

To perform a SYN scan, execute:

sudo nmap -sS remote_host

A more stealthy approach is sending invalid TCP headers, which, if the host conforms to the TCP specifications, should send a packet back if that port is closed. This will work on non-Windows based servers.

You can use the "-sF", "-sX", or "-sN" flags. They all will produce the response we are looking for:

sudo nmap -PN -p port_number -sN remote_host

To see what version of a service is running on the host, you can try this command. It tries to determine the service and version by testing different responses from the server:

sudo nmap -PN -p port_number -sV remote_host

There are many other command combinations that you can use, but this should get you started on exploring your networking vulnerabilities.

Conclusion

Understanding port configuration and how to discover what the attack vectors are on your server is only one step to securing your information and your VPS. It is an essentail skill, however.

Discovering which ports are open and what information can be obtained from the services accepting connections on those ports gives you the information that you need to lock down your server. Any extraneous information leaked out of your machine can be used by a malicious user to try to exploit known vulnerabilities or develop new ones. The less they can figure out, the better.

Please let mw know if you have any further queries on the same.

Add a comment
Know the answer?
Add Answer to:
On the Internet, research the services associated with the open port numbers from the Zenmap scan...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 166 Chapter 8: TCP/IP Applications Getting Down to Business The way network communication all those ls...

    166 Chapter 8: TCP/IP Applications Getting Down to Business The way network communication all those ls and Os) goes in and out of a machine physically is through the NIC (network interface card). The way network communication goes in and out of a machine logically though, is through a program or service. A service is a program that runs in the background, independent of a logon, that provides functionalities to a system. Windows client machines, for instance, have a Workstation...

  • Deliverable: 1 to 2 page word document capturing your answer using research from internet 1. Choose...

    Deliverable: 1 to 2 page word document capturing your answer using research from internet 1. Choose only one of the following topics: A.   Testing Client/Server Systems B.   Rapid Application Development Testing C.   Testing COTS and Contracted Software D.   Testing Web-Based Systems (a) State which topic selected. (Each best practices described and explained must be unique.) (b) State three guidelines or best practices for the topic that you have chosen. For each one, explain why it is a good to follow...

  • Figure 1 LAN Subnet: 192.168.40.0124 LAN Switch Internet External Firewall Internal Firewall DMZ Subnet: 192.168.10.0/24 LAN devices Web Server running on port 80 IDS (Snort VM) Remote Access S...

    Figure 1 LAN Subnet: 192.168.40.0124 LAN Switch Internet External Firewall Internal Firewall DMZ Subnet: 192.168.10.0/24 LAN devices Web Server running on port 80 IDS (Snort VM) Remote Access Server (Nginx VM) (OpenVPN) Overview Medium to large organisations typically consist of services that are accessed/consumed from external parties for various purposes. As such, a DMZ is a suitable solution to segregate such services from internal networkis). The network diagram provided (Figure 1) illustrates the IT environment of a medium organisation, which...

  • Healthy Lifestyles Research the South University Online Library and the Internet to read more about the...

    Healthy Lifestyles Research the South University Online Library and the Internet to read more about the behavioral patterns. Conduct an interview (via phone or face-to-face) of ten or more people in the age group of fifteen to sixty-four years, to survey the impression of their health, health problems, and lifestyle choices. Ask the following questions, while conducting the interview: Do you smoke? Do you drink alcohol? Do you wear a seatbelt while driving a car? Do you talk on the...

  • YOUR UNIVERSITY Purpose External and internal factors are the underlying bases of strategies formulated and implemented...

    YOUR UNIVERSITY Purpose External and internal factors are the underlying bases of strategies formulated and implemented by organizations. Your university/college faces numerous external opportunities/threats and has many internal strengths/weaknesses. The purpose of this exercise is to illustrate the process of identifying critical external and internal factors. External influences include trends in the following areas: economic, social, cultural, demographic, environmental, technological, political, legal, governmental, and competitive. External factors could include declining numbers of high school graduates; population shifts; community relations; increased...

  • CHapter 8 from 978-0-13-408504-3 (Security in Computing 5th Edition) 1. Explain the differences between public, private,...

    CHapter 8 from 978-0-13-408504-3 (Security in Computing 5th Edition) 1. Explain the differences between public, private, and community clouds. What are some of the factors to consider when choosing which of the three to use? 2. How do cloud threats differ from traditional threats? Against what threats are cloud services typically more effective than local ones? 3. You are opening an online store in a cloud environment. What are three security controls you might use to protect customers’ credit card...

  • Summarize the following information in easily way and in simple words as your understanding without missing the keywords. ( the Question will be 25 on this information in final ) MARKETING RESEARCH FO...

    Summarize the following information in easily way and in simple words as your understanding without missing the keywords. ( the Question will be 25 on this information in final ) MARKETING RESEARCH FOR THE NEW VENTURE Information for developing the marketing plan may necessitate conducting some marketing research. Marketing research involves the gathering of data to determine such information as who will buy the product or service, what is the size of the potential market, what price should be charged,...

  • Group Writing Assignment: Becoming a Cyber Sleuth Ever since the Internet has become a global tool...

    Group Writing Assignment: Becoming a Cyber Sleuth Ever since the Internet has become a global tool for sharing information and data, countless organizations have gone virtual. They rely on ICTs to coordinate employees and customers as they produce, distribute, or provide goods or services. As the virtual world of business and personal data has expanded, so, too, has cybercrime. According to a 2011 Symantec study, hackers and cybercriminals have cost the global economy an estimated $114 billion annually. Whether from...

  • Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic...

    Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic redundancy check (CRC) A. Yes, No, No B. No, Yes, Yes c. No, Yes, No D. No, No, Yes E. Ho, hum, ha Q2 CRC vs Internet checksums Which of these is not true? A. CRC's are commonly used at the link layer B. CRC's can detect any bit error of up to r bits with an r-bit EDC. c. CRC's are more resilient to bursty...

  • The purpose of security policies is to help mitigate identified risks. Writing these policies is easier...

    The purpose of security policies is to help mitigate identified risks. Writing these policies is easier once you have created an asset inventory list, prioritized that list, and identified the major risk exposures found in those assets. The task of identifying your IT assets begins with recognizing that your IT infrastructure and supporting resources can be divided into the seven IT domains. The benefit of identifying the assets and prioritizing them across those domains is being able to document policies...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT