Network Recon Tutorial: Ports, Services & Safe Scanning

Understand what “open ports” really mean, how to read a scan, and how defenders reduce exposure.

~6 min read

What is Network Reconnaissance?

Network reconnaissance (recon) is the process of discovering systems and the services they expose. Think of each open port as a door into an application (web server, database, SSH). Recon is how defenders verify what’s exposed and attackers look for weak spots. This tutorial shows how to read a basic scan result and what findings usually mean in the real world.

Ports & Services — Quick Primer

Ports

Numbers (0–65535) that identify “doors” to services. Common ones: 22/ssh, 80/http, 443/https, 3306/mysql, 3389/rdp.

States

open (accepting connections), closed (no service), filtered (firewall blocks/obscures).

Services

The application listening on a port. Banner or version info (e.g., OpenSSH 8.9) helps assess risk.

Sample Scan Output (nmap)

Here’s a simplified, safe example you’ll analyze in the challenge.

Note: This is a static, educational example — do not scan systems you don’t own or lack permission to test.

How to Read This

22/tcp open ssh

Remote shell access. If exposed to the internet, enforce strong auth (keys), disable passwords, and use rate limiting.

80/tcp open http → 443/tcp https

Plain HTTP should redirect to HTTPS. Check TLS and headers (HSTS, CSP) on 443.

3306/tcp filtered mysql

Database not directly reachable (good). Keep it private; expose via app layer or VPN only.

Common Risks & Defender Actions

Exposed Admin Services

SSH/RDP open to the world invites brute-force and credential-stuffing. Mitigate: key-based auth, VPN, allow-lists, MFA where supported.

Outdated Software

Old versions may have known CVEs. Mitigate: patch, auto-update, vulnerability scanning, WAF for web.

Unnecessary Exposure

Services left open “temporarily” become permanent risk. Mitigate: close unused ports, segment networks, least privilege.

Mini Glossary

Banner

Text a service sends on connect (e.g., version). Useful for identification.

Enumeration

Digging deeper after recon: versions, auth methods, directories, etc.

Attack Surface

All reachable entry points (ports, endpoints, creds). Recon maps the surface.

Quick Checklist

Ready to practice? Try the Network Recon Challenge