Content deleted Content added
mention malicious services |
destub |
||
(28 intermediate revisions by 24 users not shown) | |||
Line 1:
[[File:Open ports.png|frame|Listing open TCP ports that are listening on the local machine.]]
In security parlance, the term '''open port''' is used to mean a [[
Ports are an integral part of the Internet's [[Internet socket|communication model]] — they are the channel through which applications on the [[client (computing)|client computer]] can reach the software on the [[server (computing)|server]]. Services, such as [[web page]]s or [[ftp server|FTP]], require their respective ports to be "open" on the server in order to be publicly reachable.
The above use of the terms "open" and "closed" can sometimes be misleading, though; it blurs the distinction between a given port being reachable (unfiltered) and whether
Ports can be "closed" (in this context, filtered) through the use of a [[Firewall (computing)|firewall]]. The firewall will filter incoming packets, only letting through those packets for which it has been configured. Packets directed at a port which the firewall is configured to "close" will simply be dropped in transit, as though they never existed.
Some malicious software acts as a service, waiting for connections from a remote attacker in order to give
Malicious ("[[
== Example ==
<syntaxhighlight lang="console">
alice@wikipedia:~$ netstat --tcp --listening --numeric
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address Foreign Address State
tcp 0 0 127.0.0.1:631 0.0.0.0:* LISTEN
tcp 0 0 127.0.0.1:5432 0.0.0.0:* LISTEN
tcp 0 0 127.0.0.53:53 0.0.0.0:* LISTEN
tcp6 0 0 ::1:631 :::* LISTEN
</syntaxhighlight>
== See also ==
* [[Port scanning]]
* [[Nmap]]
* [[Computer security]] * [[List of TCP and UDP port numbers]]▼
▲*[[List of TCP and UDP port numbers]]
== References ==
{{refbegin}}
{{refend}}
{{reflist}}
== External links ==
* [http://www.
[[Category:Internet protocols]]▼
▲[[Category:Internet protocols]]
|