1 00:00:00,740 --> 00:00:07,850 So now let's talk about poison protocols, so when data is transmitted over, a network is essentially 2 00:00:07,850 --> 00:00:13,850 done over what is called port, you can think of ports as separate communication channels that hold 3 00:00:13,850 --> 00:00:14,930 specific purposes. 4 00:00:14,930 --> 00:00:21,320 So each port is going to do a different thing and you're going to use a specific port based on what 5 00:00:21,320 --> 00:00:22,340 you're trying to do. 6 00:00:22,370 --> 00:00:28,580 So just for example, like if you browse in the web, typically that traffic is set over Port 80 or 7 00:00:28,580 --> 00:00:31,930 Port 443 because those are meant for web browsing. 8 00:00:32,600 --> 00:00:35,080 And in total, you don't need to know all of them. 9 00:00:35,660 --> 00:00:36,890 You only need a handful. 10 00:00:36,890 --> 00:00:38,330 But in fact, it's on. 11 00:00:38,570 --> 00:00:43,670 If you want to impress anybody, tell them, hey, did you know that there are sixty five thousand five 12 00:00:43,670 --> 00:00:45,410 hundred thirty five possible ports? 13 00:00:45,800 --> 00:00:46,760 As an ethical hacker? 14 00:00:46,760 --> 00:00:52,460 There's some ports that you need to know or at least be aware of because these are going to be ports 15 00:00:52,460 --> 00:00:57,470 that you might find during an assessment and be able to take advantage of or just it's going to help 16 00:00:57,470 --> 00:01:01,680 you understand, you know, what a specific server computer is doing. 17 00:01:01,700 --> 00:01:02,080 All right. 18 00:01:02,240 --> 00:01:06,930 So I'm going to go over some of the top ports and protocols that you need to know. 19 00:01:07,220 --> 00:01:13,070 So these are typically going to be called like common ports because they're frequently used and they 20 00:01:13,070 --> 00:01:18,360 have specific reasons why they use and is going to be very helpful, like I say, if you don't understand. 21 00:01:18,360 --> 00:01:24,590 And so you should probably attempt over to, you know, to commit these ports and protocols to memory 22 00:01:24,890 --> 00:01:25,790 or Alisha's however. 23 00:01:25,810 --> 00:01:28,100 And also we're seeing it very quickly. 24 00:01:28,280 --> 00:01:29,600 It's going to help you in the real world. 25 00:01:29,630 --> 00:01:30,200 Don't worry. 26 00:01:30,200 --> 00:01:34,250 There's plenty of people at desks don't feel bad about this because the plain people at their desk, 27 00:01:34,250 --> 00:01:39,170 they have, you know, different kinds of like cheat sheets posted on the wall just so that they know 28 00:01:39,320 --> 00:01:41,840 because not everybody wants to take time to memorize it. 29 00:01:42,080 --> 00:01:43,950 But it will help you to memorize the book. 30 00:01:44,460 --> 00:01:50,270 So first up is going to be Port 20 and 21, which is the file transfer protocol. 31 00:01:50,280 --> 00:01:54,530 We're going to keep all of these at a very high level, just as you understand, because all you really 32 00:01:54,530 --> 00:01:55,100 need to know. 33 00:01:55,280 --> 00:02:01,700 So file transfer protocol are FTP is simply what it says is for transferring files. 34 00:02:01,910 --> 00:02:06,500 This is very important understanding of what that point is if you see it open, because might be something 35 00:02:06,500 --> 00:02:09,860 that you can exploit or use when you're doing penetration. 36 00:02:10,190 --> 00:02:13,650 So what to do is call a secure show. 37 00:02:14,000 --> 00:02:20,510 Now, this is a protocol that superseded the next one, which is twenty three. 38 00:02:20,510 --> 00:02:25,700 Tonet So both of these are pretty much methods of remote login. 39 00:02:26,060 --> 00:02:29,390 So the problem with telling that was that it was unencrypted. 40 00:02:29,400 --> 00:02:36,340 So if someone were to listen in on traffic over twenty three, everything was in plain text. 41 00:02:36,340 --> 00:02:40,340 So you can get usernames, passwords, all kinds of sensitive information. 42 00:02:40,610 --> 00:02:49,240 So important to secure a show was created to be used as an encrypted form of remote access to systems. 43 00:02:49,250 --> 00:02:55,780 So if anything is intercepted over twenty two, then you know it can't be read in plain text. 44 00:02:55,790 --> 00:02:59,490 It's not something that can be decrypted very easily, easily either. 45 00:02:59,720 --> 00:03:05,830 So it's very important to know you should choose point twenty two point twenty three if you unfortunately 46 00:03:05,840 --> 00:03:07,060 three of your computer closet. 47 00:03:07,250 --> 00:03:07,530 All right. 48 00:03:07,610 --> 00:03:10,850 So next is 25. 49 00:03:11,030 --> 00:03:15,290 This is the simple mail transport protocol, also known as SNP. 50 00:03:15,470 --> 00:03:19,250 And this is the port that, you know, mail is typically sent over. 51 00:03:19,490 --> 00:03:23,900 Next, we have Port 53, which is a domain name server DNS. 52 00:03:24,110 --> 00:03:27,530 And this pretty much allows us to map IP addresses. 53 00:03:27,530 --> 00:03:33,530 The host names like, for example, Google dot com has a specific IP address, but we might not know 54 00:03:33,530 --> 00:03:35,650 that IP address by heart. 55 00:03:35,660 --> 00:03:43,160 So we type in Google dot com and then DNS is used to figure out the exact IP address for us and takes 56 00:03:43,160 --> 00:03:43,970 us to this site. 57 00:03:44,270 --> 00:03:47,540 So this is a high level how, you know, DNS typically works. 58 00:03:47,730 --> 00:03:55,370 Then we have four eighty, which is hypertext transfer protocol, a.k.a. HTTP s just Web traffic and 59 00:03:55,370 --> 00:04:02,360 we have one 10, which is going to be the post office protocol three or pop three, as you might have 60 00:04:02,360 --> 00:04:04,130 seen him before, is a lot of people calling. 61 00:04:04,760 --> 00:04:08,050 This is simply just a port that's used to receive email. 62 00:04:08,270 --> 00:04:15,170 So I like to think of it the way I remember it says pop, pop, pop email came in or something like 63 00:04:15,170 --> 00:04:17,060 that, like email just pops in or something. 64 00:04:17,210 --> 00:04:17,800 That's good. 65 00:04:17,810 --> 00:04:18,950 That's how I remember it. 66 00:04:18,950 --> 00:04:19,910 You have to remember that way. 67 00:04:20,540 --> 00:04:21,550 That's a good way to remember it. 68 00:04:21,980 --> 00:04:28,340 The next one is part one, two, three, and that's the network time protocol, a.k.a. NNTP. 69 00:04:28,550 --> 00:04:35,360 And this is just the port that's used to synchronize time, synchronize clocks across, you know, devices 70 00:04:35,360 --> 00:04:36,000 on a network. 71 00:04:36,290 --> 00:04:42,530 So a lot of devices that connect to another device and synchronize the time with that device via this 72 00:04:42,530 --> 00:04:44,090 port and this protocol. 73 00:04:44,270 --> 00:04:51,530 So Port one thirty nine is server message block and pretty much each one of those is SMB. 74 00:04:51,530 --> 00:04:57,650 And this is kind of like file transfer, pretty much for sidedly for windows, but it's also for other 75 00:04:57,650 --> 00:04:58,490 systems as well. 76 00:04:59,030 --> 00:05:00,020 But you're going to see a lot of. 77 00:05:00,300 --> 00:05:07,440 Those it's pretty much when you're allowed to map to different drives like you have to map to another 78 00:05:07,440 --> 00:05:14,210 computer network and actually go browse the directories from your computer using SMB to do that. 79 00:05:15,750 --> 00:05:23,580 For one, sixty one is the simple network military protocol, a.k.a. as an MP, and this is pretty much 80 00:05:23,580 --> 00:05:28,130 how a network device is kind of communicating back and forth statis messages and such. 81 00:05:28,650 --> 00:05:30,110 You don't really need to know. 82 00:05:30,150 --> 00:05:32,310 You know, you're not going to be taking in too much of that. 83 00:05:32,310 --> 00:05:37,510 But it could be very helpful, as you'll see later on, for justice, for gathering information. 84 00:05:37,600 --> 00:05:38,620 OK, part three. 85 00:05:38,620 --> 00:05:43,200 Eighty nine is the lightweight directory Access Protocol, or Alhadeff. 86 00:05:43,380 --> 00:05:47,970 And this is pretty much the port that is used with Active Directory for Windows. 87 00:05:48,720 --> 00:05:51,430 So it could be useful on a penetration. 88 00:05:51,450 --> 00:05:56,160 So this is good to know, you know, what that port does because of something that we could use in the 89 00:05:56,160 --> 00:06:00,990 future and take advantage of because we definitely could potentially use lightweight directory access 90 00:06:00,990 --> 00:06:02,950 protocol to our advantage. 91 00:06:03,720 --> 00:06:08,840 Next is Port four for three, and this is just Hypertext Transfer Protocol SIGIR. 92 00:06:08,860 --> 00:06:10,330 So this is typically what we're using. 93 00:06:10,330 --> 00:06:11,040 We're on the Web. 94 00:06:11,910 --> 00:06:16,830 We're using a encrypted session so people can steal our information. 95 00:06:16,980 --> 00:06:19,320 We log into our bank accounts online. 96 00:06:19,890 --> 00:06:23,580 We're probably doing that over four, four, four, three. 97 00:06:23,770 --> 00:06:30,750 And this is securing communications and port for four or five is another port for server. 98 00:06:30,750 --> 00:06:33,320 Message block is just kind of like in a different format. 99 00:06:33,330 --> 00:06:34,820 We'll understand that a little bit later. 100 00:06:35,310 --> 00:06:42,150 Just know that's for four or five and one three nine, both our server message block and then we have 101 00:06:42,150 --> 00:06:45,630 Port three three eight nine, which is remote desktop protocol. 102 00:06:45,630 --> 00:06:50,250 And this is how we remotely login to our computers. 103 00:06:50,250 --> 00:06:55,020 You can set up for thirty three, eighty nine on your computer and be able to remote into it from another 104 00:06:55,020 --> 00:06:57,150 computer on the network over this port. 105 00:06:57,450 --> 00:07:01,080 So let's just use for kind of remote management and it was left open. 106 00:07:01,740 --> 00:07:04,530 The system could be vulnerable to a potential attack. 107 00:07:04,890 --> 00:07:07,900 You have to gather the right information to be able to attack it. 108 00:07:08,070 --> 00:07:12,150 So now let's go into a little bit about, you know, TCP and UDP. 109 00:07:12,690 --> 00:07:19,400 So when using ports, it's important to know that each port exists on both TCP and UDP. 110 00:07:19,410 --> 00:07:27,210 So there's a TCP, you know, 80 and UDP, you know, there's TCP UDP for both. 111 00:07:28,060 --> 00:07:34,240 So Tsipi is what is known as a connection oriented protocol, and that's built around, you know, confirming 112 00:07:34,240 --> 00:07:35,210 package delivery. 113 00:07:35,500 --> 00:07:39,780 So when packages are sent, every delivery is confirmed. 114 00:07:39,790 --> 00:07:44,740 And if his and his recent deliveries ever, you know, seen to fail. 115 00:07:44,750 --> 00:07:47,860 And so that makes it a little bit slow and EDP, but it's more reliable. 116 00:07:48,280 --> 00:07:53,510 Now, UDP is known as a connection with this protocol, meaning that, you know, it doesn't check for 117 00:07:53,510 --> 00:07:58,480 failed transmission of packets, you know, as a result is faster, but you might lose some information 118 00:07:58,480 --> 00:07:59,620 or packets along the way. 119 00:08:00,220 --> 00:08:06,850 So the purpose for the purpose of this cause just know that both exist because some specific protocols 120 00:08:06,850 --> 00:08:12,150 or some specific ports might be available only on the TCP. 121 00:08:12,880 --> 00:08:17,110 You don't need to know, you know, down in the trenches exactly what each one is. 122 00:08:17,110 --> 00:08:22,330 Just understand at a high level that they both exist and that you need to be aware of both of them. 123 00:08:22,360 --> 00:08:22,810 OK.