Ports
Numbers (0–65535) that identify “doors” to services. Common ones: 22/ssh,
80/http, 443/https, 3306/mysql, 3389/rdp.
Understand what “open ports” really mean, how to read a scan, and how defenders reduce exposure.
Network reconnaissance (recon) is the process of discovering systems and the services they expose. Think of each open port as a door into an application (web server, database, SSH). Recon is how defenders verify what’s exposed and attackers look for weak spots. This tutorial shows how to read a basic scan result and what findings usually mean in the real world.
Numbers (0–65535) that identify “doors” to services. Common ones: 22/ssh,
80/http, 443/https, 3306/mysql, 3389/rdp.
open (accepting connections), closed (no service), filtered (firewall blocks/obscures).
The application listening on a port. Banner or version info (e.g., OpenSSH 8.9) helps assess risk.
Here’s a simplified, safe example you’ll analyze in the challenge.
Remote shell access. If exposed to the internet, enforce strong auth (keys), disable passwords, and use rate limiting.
Plain HTTP should redirect to HTTPS. Check TLS and headers (HSTS, CSP) on 443.
Database not directly reachable (good). Keep it private; expose via app layer or VPN only.
SSH/RDP open to the world invites brute-force and credential-stuffing. Mitigate: key-based auth, VPN, allow-lists, MFA where supported.
Old versions may have known CVEs. Mitigate: patch, auto-update, vulnerability scanning, WAF for web.
Services left open “temporarily” become permanent risk. Mitigate: close unused ports, segment networks, least privilege.
Text a service sends on connect (e.g., version). Useful for identification.
Digging deeper after recon: versions, auth methods, directories, etc.
All reachable entry points (ports, endpoints, creds). Recon maps the surface.
Ready to practice? Try the Network Recon Challenge