Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

TOP 40 Protocols

One of the things Network engineers need to know is the function and port number for common services and protocols. This article provides a basic description of each, and lists the port numbers they are commonly associated with.

This table lists Top 40 protocols with port numbers and their transport protocols. TCP (transmission control protocol) is the most common transport protocol used with these protocols.

PORTS NUMBERSPROTOCOLS (SERVICE NAMES)VERSIONSMEANINGS AND USES
20 and 21File Transfer Protocol (FTP)FTPS (Implicit)FTPS (Explicit)  The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer files between a client and server on a computer network. FTP is used to transfer files between computers on a network. You can use FTP to exchange files between computer accounts, transfer files between an account and a desktop computer, or access online software archives.
22Secure Shell (SSH) SSH1 OpenSSH SSH2SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network. SSH client and server use digital signatures to verify their identity . SSH is also used to issuing remote commands.
23TelnetARPANETTelnet is a protocol that allows you to connect to remote computers (called hosts) over a TCP/IP network (such as the internet). Using telnet client software on your computer, you can make a connection to a telnet server (that is, the remote host). is used for accessing remote computers over TCP/IP networks like the Internet.
25Simple Mail Transfer Protocol (SMTP)ESMTPSMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving e-mail. Users use a program that uses SMTP for sending e-mail and either POP3 or IMAP for receiving e-mail. sendmail is the most widely-used SMTP server for e-mail.

53
 
Domain Name System (DNS)                 The domain name system (DNS) is the way that internet domain names are located and translated into internet protocol (IP) addresses . (DNS) protocol helps Internet users and network devices discover websites using human-readable host names, instead of numeric IP addresses.
69Trivial File Transfer Protocol (TFTP)TFTP Server Version 1.0 TFTP Server Version 2.0 TFTP Server Version 2.1  TFTP Server Version 2.2 TFTP Server Version 3.0  TFTP Server Version 4.0Trivial File Transfer Protocol (TFTP) is an Internet software utility for transferring files that is simpler to use than the File Transfer Protocol (FTP) but less capable. It is used where user authentication and directory visibility are not required. TFTP is a very simple file transfer protocol.
80Hyper Text Transfer Protocol (HTTP)HTTP/0.9 HTTP/1.0 HTTP/1.1 HTTP/2.0HTTP is the underlying protocol used by the World Wide Web and this protocol defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands.  It used to transfer data over the web.
67 and 68Dynamic Host Configuration Protocol (DHCP)  ISC DHCP Release 1 (version 1) ISC DHCP Release 2 (version 2) ISC DHCP Release 3 (version 3)Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a server to automatically assign an IP address to a computer from a defined range of numbers configured for a given network. It used to provide quick, automatic, and central management for the distribution of IP addresses within a network. DHCP is also used to configure the proper subnet mask, default gateway, and DNS server information on the device
110Post Office Protocol 3 (POP3)pop3 pop2POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail. POP3 is a client/server protocol in which e-mail is received and held for you by your Internet server. POP3 allows you to download email messages on your local computer and read them even when you are offline
119Network News Transport Protocol (NNTP) NNTP is the protocol used to connect to Usenet servers and transfer newsgroup articles between systems over the Internet. It is similar to the SMTP protocol used for sending email messages, but is designed specifically for newsgroup articles . It used by computer clients and servers for managing the notes posted on Usenet newsgroups.
123Network Time Protocol (NTP)NTP Version 3 NTP Version 4  The Network Time Protocol (NTP) is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks. NTP is one of the oldest Internet protocols in current use.
137 and 139NetBIOS NetBIOS (Network Basic Input/Output System) is a program that allows applications on different computers to communicate within a local area network (LAN). It was created by IBM for its early PC Network, was adopted by Microsoft.
161 and 162Simple Network Management Protocol (SNMP)SNMPv1 SNMPv2c SNMPv3Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior. … SNMP is widely used in network management for network monitoring. widely used protocol for monitoring the health and welfare of network equipment (eg. routers), computer equipment and even devices like UPSs.
389Lightweight Directory Access ProtocolLDAP Version 2 (V2) LDAP Version 3 (V3)Lightweight Directory Access Protocol (LDAP) is a client/server protocol used to access and manage directory information. It reads and edits directories over IP networks and runs directly over TCP/IP using simple string formats for data transfer.
443Transport Layer Security (TLS)SSL 1.0 SSL 2.0 SSL 3.0 TLS 1.0 TLS 1.1 TLS 1.2 TLS 1.3  Transport layer security (TLS) is a protocol that provides communication security between client/server applications that communicate with each other over the Internet. TLS is a cryptographic protocol that provides end-to-end communications security over networks and is widely used for internet communications and online transactions. It is an IETF standard intended to prevent eavesdropping, tampering and message forgery.
1023 to 65535Real-Time Transport Protocol. (RTP) Real-Time Transport Protocol (RTP) is an Internet Protocol standard that specifies the way programs manage the real-time transmission of multimedia data over unicast or multicast network services. RTP is used extensively in communication and entertainment systems that involve streaming media, such as telephony, video teleconference applications, television services.
443Hyper Text Transfer Protocol Secure. (HTTPS)HTTP/0.9 HTTP/1.0 HTTP/1.1 HTTP/2.0HTTPS is the same thing as HTTP, but uses a secure socket layer (SSL) for security purposes.  Websites that use the standard HTTP protocol transmit and receive data in an unsecured manner. This means it is possible for someone to eavesdrop on the data being transferred between the user and the Web server. HTTP is the protocol used to transfer data over the web.
143Internet Message Access Protocol. (IMAP4)IMAP version 2 IMAP3 IMAP version 4IMAP (Internet Message Access Protocol) is a standard email protocol that stores email messages on a mail server, but allows the end user to view and manipulate the messages as though they were stored locally on the end user’s computing devices.It used for accessing email on a remote web server from a local client.
3389Address Resolution Protocol (ARP) Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address that is recognized in the local network.It used to convert an IP address into a physical address
179Border Gateway Protocol (BGP)BGP version 4 BGP version 3 BGP version 2Border Gateway Protocol (BGP) is a routing protocol used to transfer data and information between different host gateways, the Internet or autonomous systems. BGP is a Path Vector Protocol (PVP), which maintains paths to different hosts, networks and gateway routers and determines the routing decision.It used to ensure AS-wide consistency.
194Internet Relay Chat (IRC)   Internet Relay Chat (IRC) is an application layer protocol that facilitates communication in the form of text. Internet Relay Chat (IRC) is a system for chatting that involves a set of rules and conventions and client/server software.
 Session Initiation Protocol. (SLP)   The Service Location Protocol  is a service discovery protocol that allows computers and other devices to find services in a local area network without prior configuration. SLP has been designed to scale from small, unmanaged networks to large enterprise networks.
 Session Description Protocol. (SDP) SDP (Session Description Protocol) is a set of rules that defines how multimedia sessions can be set up to allow all end points to effectively participate in the session. SDP is used for describing multimedia communication sessions for the purposes of session announcement, session invitation, and parameter negotiation.
3389Remote Desktop Protocol. (RDP)  Version 4.0 Version 5.0 Version 5.1 Version 5.2 Version 6.0 Version 6.1 Version 7.0 Version 7.1 Version 8.0 Version 8.1 Version 10.0Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft, which provides a user with a graphical interface to connect to another computer over a network connection. Microsoft currently refers to their official RDP client software as Remote Desktop Connection, formerly “Terminal Services Client”.
 Server Message Block (SMB)SMB / CIFS / SMB1SMB 2.0SMB 2.1SMB 3.0SMB 3.0.2SMB 3.1.1It operates as an application-layer or presentation-layer network protocol[3] mainly used for providing shared access to files, printers, and serial ports and miscellaneous communications between nodes on a network. SMB Protocol is most often used as an Application layer or a Presentation layer protocol, and it relies on lower-level protocols for transport.
22Secure File Transfer Protocol (SFTP)V3V4V5V6SFTP usually uses port 22 but can be configured to run on nearly any port. Port 22 is generally used for connection via SSH. SFTP is just one of protocols which can be run over SSH .  SFTP is a separate protocol packaged with SSH that works in a similar way over a secure connection.
2Internet Group Management Protocol (IGMP)IGMPv1 IGMPv2 IGMPv3Internet Group Management Protocol  is a protocol that allows a host to advertise its multicast group membership to neighboring switches and routers. IGMP is a standard protocol used by the TCP/IP protocol suite to achieve dynamic multicasting.
38Route Access Protocol (RAP)   The term RAP Protocol is used to describe the JSON-based message format used in the HTTP communication between a RAP client and a RAP server.  As of RAP 2.0, the entire communication between client and server uses this protocol.
39Resource Location Protocol (RLP) Radio Link Protocol (RLP) is an automatic repeat request (ARQ) fragmentation protocol used over a wireless (typically cellular) air interface. Most wireless air interfaces are tuned to provide 1% packet loss, and most Vocoders are mutually tuned to sacrifice very little voice quality at 1% packet loss.
42ARPA Host Name Server Protocol (HNSP) It is an obsolete network protocol Bascically used in translating a host name to an Internet address
1  Internet Control Messages Protocol (ICMP)ICMPv4 ICMPv6ICMP (Internet Control Message Protocol) is an error-reporting protocol network devices like routers use to generate error messages to the source IP address when network problems prevent delivery of IP packets. Provides troubleshooting, control and error message services. ICMP is most frequently used in operating systems for networked computers, where it transmits error messages.
 Remote Directory Access Protocol (RDAS)     RDA is an application-level protocol, inasmuch that it builds on an existing network connection between client and server. In the case of TCP/IP connections, RFC 1066 is used for implementing RDA.
 Lightweight Presentation Protocol (LPP) The full form of LPP is Lightweight Presentation Protocol. This protocol refers to an approach used for providing stream-lined support of open source interface application services on top of Transmission Control Protocol/Internet Protocol-based  network for some constrained environments.
3022Network Address Translation (NAT)   It enables private IP networks that use unregistered IP addresses to connect to the Internet. NAT operates on a router, usually connecting two networks together, and translates the private (not globally unique) addresses in the internal network into legal addresses, before packets are forwarded to another network.
445Microsoft Active Directory Protocol (MADP)   it is used by Microsoft server operating systems for client/server access and file and printer sharing.
1026Calendar Access Protocol (CAP) The Common Alerting Protocol (CAP) is an XML-based data format for exchanging public warnings and emergencies between alerting technologies. CAP allows a warning message to be consistently disseminated simultaneously over many warning systems to many applications, such as Google Public Alerts  
1701 Layer Two Tunnelling Protocol. (L2TP) In computer networking, Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs. It does not provide any encryption or confidentiality by itself.
1732Point to Point Tunnelling Protocol (PPTP) The Point-to-Point Tunneling Protocol (PPTP) is an obsolete method for implementing virtual private networks. PPTP has many well known security issues. PPTP uses a TCP control channel and a Generic Routing Encapsulation tunnel to encapsulate PPP packets.
135Remote Procedure Call (RPC) Remote Procedure Call (RPC) is a protocol that one program can use to request a service from a program located in another computer on a network without having to understand the network’s details.

If you have any questions, please feel free to contact us. Thank you for your interest!!
Visit our Blogs, We have released a Burp Suite Pentesters Series, might it be useful!!

The post TOP 40 Protocols appeared first on CertCube Labs.



This post first appeared on Choose The Right Path & Training To Start Your Career In Cybersecurity, please read the originial post: here

Share the post

TOP 40 Protocols

×

Subscribe to Choose The Right Path & Training To Start Your Career In Cybersecurity

Get updates delivered right to your inbox!

Thank you for your subscription

×