Network ports are entry points to any host on the Internet. If a socket is liste
ID: 3717165 • Letter: N
Question
Network ports are entry points to any host on the Internet. If a socket is listening on a port, it will accept incoming traffic, process it, and possibly respond to the client. An attacker can “scan” for open ports on a host and subsequently send malicious payload to hack the host. Port scanners are used by attackers to identify possible entry points to a target host. In this programming task, you are asked to implement a TCP port scanner to identify ports running TCP applications. Recall that TCP based applications are listening for new connections at open ports. If you send a connection request to these open ports, they will respond to the connection requests. The workflow of a typical TCP port scanner is as follows. -Sweep through the ports you are interested in scanning for an IP address -Establish a TCP connection to the IP address and port number using the socket API. If a connection is successfully established, mark the port as open and close the connection. Otherwise, mark the port as closed -Close TCP connection Use your port scanner to answer the following questions. Question 1. Identify the ports running TCP applications for each of the following IP addresses. Only scan ports numbered 1 through 1000, do not scan higher numbered ports. Your answer should look something like this: IP addresses | Open ports 31.13.74.36 | ... 40.97.142.194 | ... 172.217.14.174 | ... Question 2. Briefly describe the nature of the applications that are running on the identified ports. Consult your textbook and online resources (e.g., Google or Wikipedia). If you cannot identify the application running over a port, write N/A. Your answer should look something like this: Port number | Application description 80 | ... ... | ... ... | ... ... | ... Network ports are entry points to any host on the Internet. If a socket is listening on a port, it will accept incoming traffic, process it, and possibly respond to the client. An attacker can “scan” for open ports on a host and subsequently send malicious payload to hack the host. Port scanners are used by attackers to identify possible entry points to a target host. In this programming task, you are asked to implement a TCP port scanner to identify ports running TCP applications. Recall that TCP based applications are listening for new connections at open ports. If you send a connection request to these open ports, they will respond to the connection requests. The workflow of a typical TCP port scanner is as follows. -Sweep through the ports you are interested in scanning for an IP address -Establish a TCP connection to the IP address and port number using the socket API. If a connection is successfully established, mark the port as open and close the connection. Otherwise, mark the port as closed -Close TCP connection Use your port scanner to answer the following questions. Question 1. Identify the ports running TCP applications for each of the following IP addresses. Only scan ports numbered 1 through 1000, do not scan higher numbered ports. Your answer should look something like this: IP addresses | Open ports 31.13.74.36 | ... 40.97.142.194 | ... 172.217.14.174 | ... Question 2. Briefly describe the nature of the applications that are running on the identified ports. Consult your textbook and online resources (e.g., Google or Wikipedia). If you cannot identify the application running over a port, write N/A. Your answer should look something like this: Port number | Application description 80 | ... ... | ... ... | ... ... | ... Network ports are entry points to any host on the Internet. If a socket is listening on a port, it will accept incoming traffic, process it, and possibly respond to the client. An attacker can “scan” for open ports on a host and subsequently send malicious payload to hack the host. Port scanners are used by attackers to identify possible entry points to a target host. In this programming task, you are asked to implement a TCP port scanner to identify ports running TCP applications. Recall that TCP based applications are listening for new connections at open ports. If you send a connection request to these open ports, they will respond to the connection requests. The workflow of a typical TCP port scanner is as follows. -Sweep through the ports you are interested in scanning for an IP address -Establish a TCP connection to the IP address and port number using the socket API. If a connection is successfully established, mark the port as open and close the connection. Otherwise, mark the port as closed -Close TCP connection Use your port scanner to answer the following questions. Question 1. Identify the ports running TCP applications for each of the following IP addresses. Only scan ports numbered 1 through 1000, do not scan higher numbered ports. Your answer should look something like this: IP addresses | Open ports 31.13.74.36 | ... 40.97.142.194 | ... 172.217.14.174 | ... Question 2. Briefly describe the nature of the applications that are running on the identified ports. Consult your textbook and online resources (e.g., Google or Wikipedia). If you cannot identify the application running over a port, write N/A. Your answer should look something like this: Port number | Application description 80 | ... ... | ... ... | ... ... | ...Explanation / Answer
1)
Ip Adresses
5.153.63.162
169.38.84.49
159.8.41.131
23.246.195.8
184.173.213.195
159.122.100.42
159.50.10.10
119.81.134.226
54.68.233.232
2)
Port Number Description
20/21 FTP is one of the most commonly used file transfer protocols on the internet and within private networks. FTP control is handled on TCP port 21 and its data transfer can use TCP port 20 as well as dynamic ports depending on specific configuration.
22 SSH is the primary method used to manage network devices securely at the commanded level. it is typically used as a secure alternative to Telnet which does not support secure connections.
23 Telnet is the primary method used to manage network devices at the command level.
25 SMTP is used for two primary functions, it is used to transfer mail from source to destination b/w mail servers and it is used by end user to send email to a mail system.
53 The DNS is used widely on the public internet and on private networks to translate domain names into IP addresses, typically for n/w routing. A DNS server can also be set up within a private n/w to private naming services b/w the hosts f the internal network without being part of the global system.
69 TFTP offers a method of file transfer without the session establishment requirements that FTP uses. TFTPtypically used by devices to upgrade software and firmware; this includes Cisco and other n/w vendors equipment.
80 HTTP is one of the most commonly used protocols on most networks. HTTP is the main protocol that is used by web browsers and thus used by any client that uses files located on these servers.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.