Port understanding of networking | Switch, Router, Hub, Modem?
You've must good understanding of networking that's What is Switch, Router, Hub, Modem
It follows a big role in Ethical Hacking. You've must good understanding of networking that's What is Switch, Router, Hub, Modem?", "What is network topology? What is noces How do works LAN Loc? Area Network) WAN Wide area network MAN Metropolitan Area Network What is network Port?", "What is Internet protocol?" and also Fundamental of network and wireless Security and last all about NAT, DHCP, Subnetting, Public IP, Private IP, IPv4, IPv6, DNS, ARP, OSI model, MAC address. You must have a piece of good knowledge of these things.
- a) What is Switch, Router, Hub, Modem?
- b) What is network topology?
- c) What are nodes?
- d) How do works LAN/Local? ( Local Area Network) WAN (Wide area network ) MAN ( Metropolitan Area Network )
- e) What is a network Port?
- f) What is Internet protocol?
- g) Fundamental of network and wireless Security?
- h) All about NAT, DHCP, Subnetting, Public IP, Private IP, IPv4, IPv6, DNS, ARP, OSI model, MAC address.
Introduction to Ports
In this video, we are going to be talking about Ports. You can think of ports as exact house or apartment numbers. So IP addresses represent the city and street name and the port number represents the exact house number you are living in.
So when a computer tries to connect or communicate with another computer it not only needs the IP address but the Port as well.
So whenever we are making an application that connects one computer to another we have to make sure that we are not using the common ports.
List of 14 common network ports you should know
- 20- File Transfer Protocol (FTP) Data Transfer.
- 21- File Transfer Protocol (FTP) Command Control.
- 22- Secure Shell (SSH).
- 23- Telnet - Remote login service, unencrypted text messages.
- 25- Simple Mail Transfer Protocol (SMTP) E-mail Routing.
- 53- Domain Name System (DNS) service.
- 80- Hypertext Transfer Protocol (HTTP) used on World Wide Web.
- 110- Post Office Protocol (POP3) used by e-mail clients to retrieve e-mail from a server.
- 119- Network News Transfer Protocol (NNTP).
- 123- Network Time Protocol (NTP).
- 143- Internet Message Access Protocol (IMAP) Management of Digital Mail.
- 161- Simple Network Management Protocol (SNMP).
- 194- Internet Relay Chat (IRC).
- 443- HTTP Secure (HTTPS) HTTP over TLS/SSL.
You NEED to learn Port Security…….RIGHT NOW!! // FREE CCNA //
Port security is a VITAL thing we must learn when becoming network engineers, especially when you have hackers running around using things like the Shark Jack from HAK5. In this video, I’ll show you the best practices for securing your switch ports on Cisco Switches and Unifi (Ubiquiti) switches.
- how I can HACK your switch (SHark Jack)
- ⏩ What the Shark Jack needs
- ⏩ STEP 1 - Shutdown your ports (unused)
- ⏩ STEP 2 - BLACKHOLE VLAN!!
- ⏩ STEP 3 - Port Security
- ⏩ How to configure Port Security