Week 2 Top Targeted Ports - RUNNING HEADER Top Targeted Ports Top Targeted Ports Jessica Risch Friends University Top Targeted Ports 2 Abstract

Week 2 Top Targeted Ports - RUNNING HEADER Top...

This preview shows page 1 - 4 out of 8 pages.

RUNNING HEADER: Top Targeted PortsTop Targeted PortsJessica RischFriends University
Top Targeted PortsAbstractPort scanning is used by hackers to gain insight into a system and view vulnerabilities with the services that are used with these ports. Finding the weaknesses within these services allows an attacker to pinpoint their attack, which helps to gain access to the system itself or the valuable data that it protects. This report discusses the six top targeted ports and the services that they house, along with the weaknesses that hackers exploit to gain access, steal data, or to simply cause havoc. 2
Top Targeted PortsPort scanning is an instrumental tool that is used by hackers to gain insight into an environment. This process allows the attacker to determine whether ports are opened or closed, the services used by a particular port, as well as, assisting with network mapping. Intruders are then able to review their findings to determine if there is a particular weakness that exists, which will allow them to target their attack. Although there are many ports that have proven to have significant weaknesses, the focus will be for those that have been targets of a substantial amount of recent attacks.According to SANS Internet Storm Center, the current port that has experienced the majority of attacks within the last 24 hours is port 23. This port is known for the Telnet service, which allows users to connect to a PC remotely and transfer files while logged into the machine, as well as, managing the host itself. One particular key fact with Telnet is that it passes all data inclear text. Telnet is one of the oldest services, however, it is also considered one of the most dangerous services due to its weaknesses. Many tactics are used to infiltrate Telnet, including: Trojan Horses, worms, and packet sniffers. One of the more recent attacks that is used to infiltrate this port is denial of service. An attacker sends packets to port 23, which causes a DoS

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture