# Protocol

<table><thead><tr><th width="96.33333333333331">Port</th><th width="158">Service</th><th>Description</th></tr></thead><tbody><tr><td>1</td><td>TCPMUX</td><td>TCP Port Service Multiplexer</td></tr><tr><td>5</td><td>RJE</td><td>Remote Job Entry</td></tr><tr><td>7</td><td>ECHO or ICMP</td><td></td></tr><tr><td>18</td><td>MSP</td><td>Message Send Protocol</td></tr><tr><td>20</td><td>FTP</td><td>File Transfer Protocol (Active mode data)</td></tr><tr><td>21</td><td>FTP</td><td>File Transfer Protocol (Control data between client and server) </td></tr><tr><td>22</td><td>SSH</td><td>Secure Shell Service</td></tr><tr><td>22</td><td>SCP</td><td>Secure Copy Protocol</td></tr><tr><td>22</td><td>SFTP</td><td>Secure FTP</td></tr><tr><td>23</td><td>Telnet</td><td></td></tr><tr><td>25</td><td>SMTP</td><td>Simple Mail Transfer Protocol</td></tr><tr><td>29</td><td>MSG ICP</td><td></td></tr><tr><td>37</td><td>Time</td><td></td></tr><tr><td>42</td><td>Nameserv</td><td>Host Name Server </td></tr><tr><td>43</td><td>WHOIS</td><td></td></tr><tr><td>49</td><td>TACACS</td><td>Terminal Access Control Access Control System</td></tr><tr><td>53</td><td>DNS</td><td>Domain Name System</td></tr><tr><td>67 </td><td>DHCP (UDP)</td><td>Dynamic Host Configuration Protocol (Server)</td></tr><tr><td>68 </td><td>DHCP (UDP)</td><td>Dynamic Host Configuration Protocol (Client)</td></tr><tr><td>69</td><td>TFTP (UDP)</td><td>Trivial File Transfer Protocol</td></tr><tr><td>70</td><td></td><td>Gopher Service</td></tr><tr><td>79</td><td>Finger</td><td></td></tr><tr><td>80</td><td>HTTP</td><td>Hypertext Transfer Protocol</td></tr><tr><td>88</td><td>Kerberos</td><td></td></tr><tr><td>103</td><td></td><td>X.400 Standard</td></tr><tr><td>110</td><td>POP3</td><td>Post Office Protocol version 3</td></tr><tr><td>111</td><td>RPC</td><td>Remote Procedure Call</td></tr><tr><td>118</td><td></td><td>SQL Service</td></tr><tr><td>119</td><td>NNTP</td><td>Network News Transfer Protocol - Newsgroup</td></tr><tr><td>123</td><td>NTP (UDP)</td><td>Network Time Protocol</td></tr><tr><td>135</td><td>Windows RPC</td><td>Windows RPC</td></tr><tr><td>137</td><td>NetBIOS (UDP)</td><td>Name Services (Network Basic Input/Output System) </td></tr><tr><td>138</td><td>NetBIOS (UDP)</td><td>Datagram Services</td></tr><tr><td>139</td><td>NetBIOS (UDP)</td><td>Session Services</td></tr><tr><td>143</td><td>IMAP4</td><td>Internet Message Access Protocol</td></tr><tr><td>161</td><td>SNMP</td><td>Simple Network Management Protocol (Agent Received)<br><br><strong>SNMP Request:</strong> Get, GetNext, Set, GetBulk, Response, Trap, Inform.</td></tr><tr><td>162</td><td>SNMP</td><td>Simple Network Management Protocol (Manager, Traps)</td></tr><tr><td>179</td><td>BGP</td><td><strong>Border Gateway Protocol</strong><br>A standardized exterior gateway protocol designed to exchange routing and reach-ability information among autonomous systems on the Internet. The protocol is classified as a path vector protocol.</td></tr><tr><td>190</td><td>GACP</td><td>Gateway Access Control Protocol</td></tr><tr><td>197</td><td>DLS</td><td>Directory Location Service</td></tr><tr><td>201</td><td>AppleTalk</td><td></td></tr><tr><td>389</td><td>LDAP</td><td>Lightweight Directory Access Protocol</td></tr><tr><td>443</td><td>HTTPS</td><td>Hypertext Transfer Protocol Secure</td></tr><tr><td>444</td><td>SNPP</td><td>Simple Network Paging Protocol</td></tr><tr><td>445</td><td>SMB</td><td>Server Message Block</td></tr><tr><td>458</td><td></td><td>Apple QuickTime</td></tr><tr><td>464</td><td>kpasswd5</td><td>Kerberos password Service</td></tr><tr><td>465</td><td>SMTPS</td><td>Simple Mail Transfer Protocol Secure</td></tr><tr><td>500</td><td>ISAKMP (UDP)</td><td><strong>Internet Security Association and Key Management Protocol</strong><br>Internet Key Exchange (IKE) used with IPSec</td></tr><tr><td>512</td><td>rexec</td><td><p>rexec (username / password)</p><p><br>It is a service that <strong>allows you to execute a command inside a host</strong> if you know valid <strong>credentials</strong> (username and password).</p></td></tr><tr><td>513</td><td>rlogin</td><td><p>rlogin (telnet)</p><p></p><p>This service was mostly used in the old days for remote administration but now because of security issues this service has been replaced by the slogin and the ssh.</p></td></tr><tr><td>514</td><td>rhosts</td><td><strong>Rsh</strong> use <strong>.rhosts</strong> files and <strong>/etc/hosts.equiv</strong> for authentication. These methods relied on IP addresses and DNS (Domain Name System) for authentication. However, spoofing IP addresses is fairly easy, especially if the attacker is on the local network.</td></tr><tr><td>514</td><td>rcp</td><td>Remote Copy</td></tr><tr><td>514</td><td>SYSLOG (UDP)</td><td></td></tr><tr><td>515</td><td>LPD/LPR</td><td>Line Printer Daemon / Line Printer Requester</td></tr><tr><td>520</td><td>RIP</td><td>Routing Information Protocol</td></tr><tr><td>546</td><td>DHCPv6 (UDP)</td><td>Client</td></tr><tr><td>547</td><td>DHCPv6 (UDP)</td><td>Server</td></tr><tr><td>587</td><td>SMTP</td><td>Simple Mail Transfer Protocol<br><br><strong>SMTP Request:</strong> MAIL, RCPT, DATA</td></tr><tr><td>593</td><td>RPC</td><td>RPC over HTTPS</td></tr><tr><td>631</td><td>IPP</td><td>Internet Printing Protocol</td></tr><tr><td>636</td><td>LDAPS</td><td>Lightweight Directory Access Protocol Secure</td></tr><tr><td>873</td><td>Rsync</td><td><strong>rsync</strong> is a utility for efficiently <a href="https://en.wikipedia.org/wiki/File_transfer">transferring</a> and <a href="https://en.wikipedia.org/wiki/File_synchronization">synchronizing</a> <a href="https://en.wikipedia.org/wiki/Computer_file">files</a> between a computer and an external hard drive and across <a href="https://en.wikipedia.org/wiki/Computer_network">networked</a> <a href="https://en.wikipedia.org/wiki/Computer">computers</a> by comparing the <a href="https://en.wikipedia.org/wiki/Timestamping_(computing)">modification times</a>and sizes of files.<a href="https://en.wikipedia.org/wiki/Rsync#cite_note-man_page-3">[3]</a> It is commonly found on <a href="https://en.wikipedia.org/wiki/Unix-like">Unix-like</a> <a href="https://en.wikipedia.org/wiki/Operating_system">operating systems</a>. The rsync algorithm is a type of <a href="https://en.wikipedia.org/wiki/Delta_encoding">delta encoding</a>, and is used for minimizing network usage. <a href="https://en.wikipedia.org/wiki/Zlib">Zlib</a> may be used for additional <a href="https://en.wikipedia.org/wiki/Data_compression">data compression</a>,<a href="https://en.wikipedia.org/wiki/Rsync#cite_note-man_page-3">[3]</a> and <a href="https://en.wikipedia.org/wiki/Secure_Shell">SSH</a> or <a href="https://en.wikipedia.org/wiki/Stunnel">stunnel</a> can be used for security.</td></tr><tr><td>902</td><td>VMware</td><td></td></tr><tr><td>990</td><td>FTPs</td><td>File Transfer Protocol Secure</td></tr><tr><td>993</td><td>IMAPS</td><td>Internet Message Access Protocol Secure</td></tr><tr><td>995</td><td>POP3S</td><td>Post Office Protocol Secure</td></tr><tr><td>1080</td><td>Socks Proxy</td><td></td></tr><tr><td>1194</td><td>VPN</td><td>Virtual Private Network / OpenVPN</td></tr><tr><td>1433</td><td>MS-SQL</td><td>Microsoft SQL</td></tr><tr><td>1434</td><td>MS-SQL</td><td>Microsoft SQL (Monitoring)</td></tr><tr><td>1521</td><td>Oracle</td><td></td></tr><tr><td>1629</td><td>DameWare</td><td></td></tr><tr><td>1723</td><td>PPTP</td><td>Point-to-Point Tunneling Protocol</td></tr><tr><td>1812</td><td>RADIUS</td><td>Remote Authentication Dial-In User Service</td></tr><tr><td>1813</td><td>RADIUS</td><td>Remote Authentication Dial-In User Service</td></tr><tr><td>2049</td><td>NFS</td><td>Network File System</td></tr><tr><td>2082</td><td>cPanel</td><td></td></tr><tr><td>2083</td><td>cPanel</td><td></td></tr><tr><td>2967</td><td>Symantec</td><td></td></tr><tr><td>3128</td><td>Squid Proxy</td><td></td></tr><tr><td>3306</td><td>MySQL</td><td><strong>MySQL</strong> is a freely available open source Relational Database Management System (RDBMS) that uses Structured Query Language (<strong>SQL</strong>).</td></tr><tr><td>3389</td><td>RDP</td><td>Remote Desktop Protocol</td></tr><tr><td>5060</td><td>SIP</td><td>Session Initiation Protocol</td></tr><tr><td>5061</td><td>SIP</td><td>Session Initiation Protocol with TLS</td></tr><tr><td>5222</td><td>Jabber</td><td></td></tr><tr><td>5223</td><td>XMPP</td><td>Extensible Messaging and Presence Protocol</td></tr><tr><td>5432</td><td>PostgreSQL</td><td></td></tr><tr><td>5500</td><td>VNC Server</td><td>Virtual Network Computing</td></tr><tr><td>5666</td><td>Nagios</td><td></td></tr><tr><td>5800</td><td>VNC </td><td>VNC over HTTP</td></tr><tr><td>5900</td><td>VNC Server</td><td></td></tr><tr><td>5985</td><td>WinRM</td><td>Windows Remote Management</td></tr><tr><td>5986</td><td>WinRMs</td><td>Windows Remote Management over HTTPS</td></tr><tr><td>6000</td><td>X11</td><td><strong>The X Window System</strong> <br>A windowing system for bitmap displays, common on Unix-like operating systems. Provides the basic framework for a GUI environment: drawing and moving windows on the display device and interacting with a mouse and keyboard.</td></tr><tr><td>6129</td><td>DameWare</td><td>Remote Access Software on port 6129</td></tr><tr><td>6667</td><td>IRC</td><td>Internet Relay Chat</td></tr><tr><td>8080</td><td>HTTP Proxy</td><td></td></tr><tr><td>8086</td><td>Kaspersky AV</td><td></td></tr><tr><td>8087</td><td>Kaspersky AV</td><td></td></tr><tr><td>9001</td><td>Tor</td><td></td></tr><tr><td>9001</td><td>HSQLDB </td><td>HyperSQL DataBase</td></tr><tr><td>9100</td><td>HP JetDirect</td><td></td></tr><tr><td>10000</td><td>Webmin</td><td></td></tr><tr><td>27017</td><td>MongoDB</td><td></td></tr></tbody></table>


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://vulnableone.gitbook.io/vulnableone/offensive-treasure/penetration-testing/theory/protocol.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
