What are proxy ports and protocols?

Website design By BotEap.comAny time a computer receives or transmits information, whether it is a home computer or a server, it does so through an open port that is at some point connected to a router, which will then send the information over the Internet. Depending on the type of data being processed, certain specific ports are used.

Website design By BotEap.comOn proxy servers, there are several ports that are most commonly used. These protocols communicate with external devices, such as routers, using a protocol. Protocols are used to allow computers to communicate with each other and to establish how information is sent over the Internet.

Website design By BotEap.comThe most common protocol used by proxy ports is TCP – Transmission Control Protocol. TCP is an essential part of any TCP/IP network. While the IP -Internet Protocol- deals with the data packets that are being transmitted, TCP is responsible for guaranteeing that these packets will be delivered and that they will arrive at their destination in the same order in which they were sent through a port. specific. . Some ports use another type of protocol, which is UDP. Although UDP also establishes communication between ports, it does not guarantee it.

Website design By BotEap.comOther commonly used protocols are:

Website design By BotEap.como HTTP: sets the format in which web browsers and Internet sites communicate with each other

Website design By BotEap.como FTP – set formats for file transfers

Website design By BotEap.como IMAP – determines the communication between email servers and their clients

Website design By BotEap.como SSL Protocol: determines the formats used for encrypted communication

Website design By BotEap.comThe most used proxy ports are:

Website design By BotEap.comTCP port 80

Website design By BotEap.comProtocol / Name: WANRemote

Website design By BotEap.comDescription: Standard web service port. When transferring sensitive data, port 443 is recommended as it is a vulnerable Trojan port. It should be tested for vulnerabilities if used, either through spyware removal programs or firewalls.

Website design By BotEap.comTCP port 8000

Website design By BotEap.comProtocol / Name: iRDMI

Website design By BotEap.comDescription: It is not a Trojan port.

Website design By BotEap.comTCP port 8080

Website design By BotEap.comProtocol / Name: http-alt

Website design By BotEap.comDescription: An alternate HTTP port. It is a vulnerable Trojan port and should be tested for vulnerabilities if used, either through spyware removal programs or firewalls.

Website design By BotEap.comTCP port 8081

Website design By BotEap.comProtocol / Name: blackice-logon

Website design By BotEap.comDescription: Network management port for BlackIce’s intrusion detection program through your host-based firewall.

Website design By BotEap.comTCP port 443

Website design By BotEap.comProtocol / Name: https

Website design By BotEap.comDescription: A secure port that uses HTTP over SSL. Information sent through this port is encrypted using the SSL protocol.

Website design By BotEap.comTCP port 444

Website design By BotEap.comProtocol / Name: snpp

Website design By BotEap.comDescription: Uses the simple network paging protocol for data transfers.

Website design By BotEap.comTCP port 1080

Website design By BotEap.comProtocol / Name: socks

Website design By BotEap.comDescription: A SOCKS port used for outgoing TCP services, such as FTP and HTTP. As with port 80 and 8080, it is vulnerable to attack. Attackers connecting to this port can bounce back to other internal hosts that would otherwise be protected from direct attacks. Port scans should be performed to listen for connection attempts to this port.

Website design By BotEap.comTCP port 2301

Website design By BotEap.comProtocol / Name: Cpq-wbem

Website design By BotEap.comDescription: Compaq HTTP port.

Website design By BotEap.comTCP port 3128

Website design By BotEap.comProtocol / Name: ReverseWWWTunnel

Website design By BotEap.comDescription: Reverse WWW tunnel backdoor port.

Website design By BotEap.comTCP port 3382

Website design By BotEap.comProtocol / Name: fujitsu-neat

Website design By BotEap.comDescription: Fujitsu Net Enhanced anti-theft port.

Leave a Reply

Your email address will not be published. Required fields are marked *