The Top 15 Network Protocols and Ports Explained // FTP, SSH, DNS, DHCP, HTTP, SMTP, TCP/IP

Поделиться
HTML-код
  • Опубликовано: 3 июн 2024
  • If you are learning networking, these are the top protocols and port numbers you will NEED to know. Good for the CCNA, Net+, Sec+, CEH, Pentest+, or that pesky interview you need to ace.
    Download the pcap here and follow right along:
    packetpioneer.com/wp-content/...
    == More On-Demand Training from Chris ==
    ▶Getting Started with Wireshark - bit.ly/udemywireshark
    ▶Getting Started with Nmap - bit.ly/udemynmap
    == Live Wireshark Training ==
    ▶TCP/IP Deep Dive Analysis with Wireshark - bit.ly/virtualwireshark
    == Private Wireshark Training ==
    Let's get in touch - packetpioneer.com/product/pri...
    Thank you to wiki.wireshark.org/SampleCapt... and Johannes Weber for the pcap samples that I was not able to create on my own!
    For professional inquiries please contact me at packetpioneer@gmail.com
  • НаукаНаука

Комментарии • 108

  • @KaySwiss21
    @KaySwiss21 2 года назад +38

    Can't wait to watch this video in full after work today!! Some of the best cyber security/networking content on RUclips!

  • @yeayea8334
    @yeayea8334 2 года назад +17

    0:48 FTP
    4:25 SSH
    5:56 Telnet
    9:01 SMTP
    12:24 DNS
    14:18 DHCP

    • @user-fq3cg9jo5d
      @user-fq3cg9jo5d 3 месяца назад

      Here is an outline detailing each topic and the actions taken in Wireshark from the video:
      I. FTP
      Port number: 21
      Actions:
      Filtered for "ftp" to only see FTP payload packets (33 packets)
      Filtered for "tcp.port==21" to see TCP handshake/overhead packets too (101 packets)
      Showed login and password in cleartext
      Showed example of port scan at end of FTP conversation
      II. SSH
      Port number: 22
      Actions:
      Filtered for "tcp.port==22"
      Showed encrypted traffic after initial version request info
      III. Telnet
      Port number: 23
      Actions:
      Filtered for "tcp.port==23"
      Showed cleartext data with ASCII interpretation
      Used "Follow TCP Stream" to view client-server communication
      IV. SMTP
      Port numbers: 25, 587
      Actions:
      Filtered for "tcp.port==25"
      Showed cleartext and StartTLS encrypted examples
      V. DNS
      Port number: 53
      Actions:
      Showed need to use UDP instead of TCP
      Showed DNS request and response
      VI. DHCP
      Port numbers: 67, 68
      Actions:
      Filtered for just "dhcp"
      Showed discover, offer, request, ack flow
      VII. TFTP
      Port number: 69
      Actions:
      Showed read request for file
      VIII. HTTP
      Port number: 80
      Actions:
      Filtered for "tcp.port==80"
      Showed GET request and web server response in cleartext
      Used "Follow TCP Stream" to view web banner
      IX. POP3
      Port numbers: 110, 995 (TLS)
      Actions:
      Filtered for "tcp.port==110"
      Showed login info in cleartext
      X. IMAP
      Port numbers: 143, 993 (TLS)
      XI. NTP
      Port number: 123
      Actions:
      Filtered for just "ntp"
      Showed NTP client-server communication
      XII. SNMP
      Port number: 161 (UDP)
      Actions:
      Filtered for "udp.port==161"
      XIII. LDAP
      Port number: 389
      Actions:
      Filtered for "tcp.port==389"
      Showed simple LDAP login
      XIV. HTTPS
      Port number: 443
      Actions:
      Filtered for "tcp.port==443"
      Showed initial client hello in cleartext
      XV. SMB
      Port number: 445
      Actions:
      Filtered for "tcp.port==445"

  • @KellenBegin
    @KellenBegin 2 года назад +3

    thank you for your great content. not just explaining but showing examples with wireshark!

  • @Shalom_Mike
    @Shalom_Mike 2 года назад +19

    Thank you, Chris! Ever since I watched you on David Bombal's channel, I have become a fan of your teaching style. I am a Systems Engineer and you have greatly helped my understanding of the network side.

    • @JeffreyHandy
      @JeffreyHandy 2 года назад +2

      Same here. I’m learning way more than I was - thank you!

    • @emmanuelmotsi
      @emmanuelmotsi Год назад +1

      same here!

  • @louisvarre2197
    @louisvarre2197 2 года назад +1

    Incredible lecture! I’ve been studying this information for months and having trouble retaining it, until now. Thanks!

  • @nathanprisbrey792
    @nathanprisbrey792 2 года назад +1

    I love the tests that you gave as you introduced each different protocol -- very entertaining!

  • @benjamindeporte3806
    @benjamindeporte3806 Год назад +2

    Great content - simple to understand, but yet lots of good information !

  • @misero1
    @misero1 10 месяцев назад +1

    Not gonna lie. Totally underrated video. Definitely going to recommend this to the study group I'm running.
    Keep up the good work

  • @krunokartus5382
    @krunokartus5382 Год назад +1

    Tnx for the lecture. Just stumbled to it and find your style really calm and clear

  • @cwmcnutt
    @cwmcnutt 2 года назад +10

    This is such a badass channel! Always great explanations and real world examples and with a pcap file attached! Thank you Chris for always providing great FREE training.

    • @ChrisGreer
      @ChrisGreer  2 года назад +1

      Thanks @NetworkNutt! Really happy you found the channel and I appreciate the comment.

    • @davdiaz24
      @davdiaz24 2 года назад +3

      Yup so glad David B. Had him on his channel. This channel hits the spot for great breakdowns and easy to digest as far as his topics. This guy was meant to teach.

  • @nicktucker3437
    @nicktucker3437 8 месяцев назад

    pretty easy, straightforward stuff; learned all this in the 90s and thankfully have retained most of it. Thank you for the review. Memorizing really obscure stuff like HSRP using port udp 1985 was fun too.

  • @tahersadeghi6773
    @tahersadeghi6773 8 месяцев назад

    Like all of your videos, smooth and pleasant. Thank you Chris.

  • @reneefarrow3494
    @reneefarrow3494 Год назад +1

    Straight to the point - thank you.

  • @gcara4
    @gcara4 11 месяцев назад

    Excellent explanation Chris!!

  • @vitali1917
    @vitali1917 2 года назад

    Thank you so much Chris.Very informative video!!!Great explanation,love it!!!

  • @playtime_paradise
    @playtime_paradise Год назад

    Thanks for informative video Chris!

  • @poscal360
    @poscal360 7 месяцев назад

    it's been a week since i'm gathering through your video, those video are so helpful for my understanding of the network. Thank you for the time that you spent creating and editing those video.
    sincerely

  • @surajthakkar
    @surajthakkar Месяц назад

    Superb content…thank you for this 🙏

  • @zoeyweller6357
    @zoeyweller6357 7 месяцев назад

    Chris, you're the man! Thank you so much for sharing all of you knowledge, I continue to learn so much from you and I am so grateful!

  • @weniweedeewiki.6237
    @weniweedeewiki.6237 Год назад

    I love too watch more but i got to up in the morning to prepare for my ccna which is on the 1/2/2023...man i learn so much from you bro....

  • @mowatrcm1
    @mowatrcm1 Месяц назад

    Awesome work man. Thank you.👍🙏

  • @errolsimmonds4133
    @errolsimmonds4133 Год назад

    Hey Chris, thank you so much for your amazing videos.

  • @majiddehbi9186
    @majiddehbi9186 2 года назад +2

    that was realy informative thx dear chris good bless u

  • @itaneh6200
    @itaneh6200 2 месяца назад

    This is awesome Chris

  • @user-kb4rn8zt9e
    @user-kb4rn8zt9e 8 месяцев назад

    Thnaks Chris you explain very well. Best regards from France

  • @manadeldia6443
    @manadeldia6443 5 месяцев назад

    You are doing a great service teaching us all this in a neat and easy way. Thank you.

    • @ChrisGreer
      @ChrisGreer  5 месяцев назад +1

      You are very welcome

  • @lechzracpogi1484
    @lechzracpogi1484 Год назад

    Great video. Thanks Chris!

  • @BoniShadat
    @BoniShadat Год назад

    Nice and thanks

  • @neadlead2621
    @neadlead2621 Год назад

    love the video chris , can I ask if u can do a deepdive into dns so we see the headers and the flags and how they are used in ddos and dns recursive flood , thanks for sharing

  • @mcgirishnetwork
    @mcgirishnetwork 2 года назад

    Amazing information

  • @cypress696
    @cypress696 2 года назад +1

    Amazing content as always, one of the best channels on RUclips

  • @billiraydray
    @billiraydray 2 года назад

    thank you so much Chris........I'm so happy for the content you've been providing. love from Sierra Leone

  • @juansanchez-fu5jh
    @juansanchez-fu5jh 2 года назад

    awesome work man keep doing these please!! i need the knowledge.

  • @kevingendron5586
    @kevingendron5586 2 года назад

    Oh heck ya!! This video is an excellent review of ports and protocols as a NOOB, but I’m also going to use it to get more comfortable with Wireshark. Thanks Chris!

    • @ChrisGreer
      @ChrisGreer  2 года назад

      Glad it was helpful! Please keep in touch.

  • @thenoblequraann
    @thenoblequraann 2 года назад

    Very well explained, was waiting for such video :
    Would have mentioned RDP tooo!!

    • @ChrisGreer
      @ChrisGreer  2 года назад

      I know… that was one more I could have added. Maybe I need a round 2 video! 😁

  • @abrasana8538
    @abrasana8538 Год назад +1

    one word enough. perfect

  • @FRITTY12348546
    @FRITTY12348546 Год назад

    Damm this was fun thank you Chris

  • @anunymous7
    @anunymous7 2 года назад

    You are a gift, thank you so much! ❤

  • @justcurious1940
    @justcurious1940 6 месяцев назад

    Thanks Chris.

  • @johnc5258
    @johnc5258 Год назад

    this was great. subbed

  • @johnvardy9559
    @johnvardy9559 Год назад

    Chris the great.Amazing topics as well, if i buy your course i found all of these?

  • @S2eedGH
    @S2eedGH 2 года назад

    Thanks for the Wonderful content. May I ask why we use SMB while we have FTP or SFTP, all of them used for transfer file, right?

  • @shawn8163
    @shawn8163 2 года назад

    Great content

  • @rteeraphong
    @rteeraphong 7 месяцев назад

    Superb!! Why doesn't the teacher teach me like this 😂

  • @aloewishus
    @aloewishus Год назад

    this is so interesting! Ishould be coding for my work...instead I'm watching these things called packets fly around. 😲

  • @md_daud
    @md_daud 2 года назад

    Thank you ❤️

  • @user-sc2gg7dn3d
    @user-sc2gg7dn3d Год назад

    Thanks

  • @cryproot9845
    @cryproot9845 2 года назад

    I have started in this beautiful world of content on RUclips, I am new to this and here we go with issues of cybersecurity and ethical hacking

    • @ChrisGreer
      @ChrisGreer  2 года назад

      Awesome! Welcome to the dark side. :-) Ok just kidding. Enjoy the content!

  • @olafzijnbuis
    @olafzijnbuis Год назад +1

    Interesting and very clear video.
    But I wonder why you should have to KNOW all them port numbers.
    I feel it makes more sense to understand the purpose and global working of the protocol. The details are easy to find.
    The port number is very useful, of course, but easy to look up.
    Or do they ask you at exams "What is the port number for FTP?"

    • @ChrisGreer
      @ChrisGreer  Год назад

      Like I said in the video, if you are studying for a cert, this stuff will definitely come up on the test. Also - if you are doing more packet analysis or network enumeration, learning the port numbers will really help speed up your analysis.

    • @olafzijnbuis
      @olafzijnbuis Год назад

      @@ChrisGreer I am sure that if I ever do some real work in this field I will pick up the most common port number quickly.
      Just learning them is pointless.
      They are after all not like traffic signs where there is no time to ask Google.
      I prefer to acquire knowledge, not facts.
      All this assumes that there is no logic in the port numbers used.
      I am just looking at your excellent videos because I like to know a little more about it.

  • @ssd431
    @ssd431 2 года назад

    Thank you soooooooo muuuuuuccccchhh, I made a protocol post and its on my wall it was sooo much work ToT

    • @ChrisGreer
      @ChrisGreer  2 года назад +1

      You bet! I hope the video helps you remember all this. 👍

  • @likeaboss512
    @likeaboss512 8 месяцев назад

    Don't forget snmp runs on 162 as well when utilizing traps

  • @Leafspine
    @Leafspine 2 года назад

    Hi Chris,like from Kyrgyzstan 👍

    • @ChrisGreer
      @ChrisGreer  2 года назад

      Wassup!! Thanks for the comment!

  • @jonkeck7489
    @jonkeck7489 2 года назад

    Chris, another great video! Where could one purchase a packethead T-shirt?

    • @ChrisGreer
      @ChrisGreer  2 года назад

      Thanks! You should see links to the merch below the video or on my channel store

  • @house105a
    @house105a 2 года назад

    Chris, amazing video and also the conversation with David Bombal. I have a workshop coming up that I would love for you to present at in San Juan, Puerto Rico. If interested, please reply and we can discuss. The workshop is in May with the Department of Homeland Security. Thanks

    • @ChrisGreer
      @ChrisGreer  2 года назад

      Hi Vince! Thanks for the comment. Sure let’s chat. I will reach out on LinkedIn.

  • @neadlead2621
    @neadlead2621 Год назад

    I have another question ,please if we tftp uses udp why we see the client makes an ack for the packet ?

  • @SharukhKhan-kf7fj
    @SharukhKhan-kf7fj 2 года назад +1

    Thanks chris again.
    Amazing explanation.
    Chris can we bypass HSTS protocol means we can downgrade it to http.
    I research on it but i can't read any reliable content about it. So chris if you konow any method than please make a videos on it

    • @ChrisGreer
      @ChrisGreer  2 года назад

      Hey! Thanks for the comment. Hmmm… I will need to dig into that and do some testing.

  • @sreekanth5009
    @sreekanth5009 2 года назад

    Your fans from India 🇮🇳 ♥

  • @rammyunderwater
    @rammyunderwater 2 года назад

    Hello Mr Chris , am kindly asking where can I get some the trace files you captured for the different kinds of attacks on you device . I would like to go through them for my own understanding.

    • @ChrisGreer
      @ChrisGreer  2 года назад

      Hello Ramson - I usually put the pcap I am working with in the description for most of my videos. If I didn’t put it there it is because I couldn’t, or it just was not a good one to share. Thanks for the comment.

  • @codedecode285
    @codedecode285 2 года назад +1

    Hey Chris Greer from where u learn this

    • @ChrisGreer
      @ChrisGreer  2 года назад +1

      I started out as a network engineer. I always was amazed at the packet people that were able to fix the stuff that nobody else could. I was hooked!

  • @Closer80IT
    @Closer80IT 2 года назад

    Quick question:
    is it possible that a clients generates 0 length packets with the same sequence and next sequence number?

    • @ChrisGreer
      @ChrisGreer  2 года назад

      Yes, if the ack number increases, then it is just acking new data. If the ack number does not increase, it is a duplicate ack.

  • @jax4652
    @jax4652 Год назад

    Today in class we needed to look at a SMTP and a POP3 file in wireshark, and I asked if SMTP can be encrypted. They said no. Argh, so frustrating to hear that it can be, after all.

  • @JameelNasirShah
    @JameelNasirShah 2 месяца назад

    DNS : TCP/UDP 53
    FTP: TCP 21 for Control Channel, 20 for Data Channel
    DHCP: UDP 68 for Client, 68 for Server
    HTTP: TCP 80
    HTTPS: TCP 443
    IMAP: TCP 143, over TLS uses 993
    LDAP: UDP 389, LDAPs: TCP 636
    NTP: UDP 123
    POP3: TCP 110, over TLS uses 995
    SMTP: TCP 25
    SNMP: UDP 161
    SMB: UDP 445
    SSH: TCP 22
    TELNET: TCP 23
    TFTP: UDP 69

  • @thelostmarbles4310
    @thelostmarbles4310 2 года назад

    Please help... If DHCP 'gives' a computer an ip address... what does it mean to give an 'address to an address'. This seems like sending a letter to someone's address and contained within the letter is an address?? How can the 'new dhcp address' reach the address if there is no address??

  • @sri9277
    @sri9277 2 года назад

    Waiting for video

    • @ChrisGreer
      @ChrisGreer  2 года назад +1

      Coming soon!

    • @sri9277
      @sri9277 2 года назад +1

      @@ChrisGreer congratulations for 50k subscribers soon you will reach one million subscribers . You are delivering a great content in RUclips . Once again thank you for all this knowledge.

  • @michaelmueller5211
    @michaelmueller5211 Год назад

    dns:53, dns over tls:853

  • @HalfInsaneOutdoorGuy
    @HalfInsaneOutdoorGuy 10 месяцев назад

    TFTP is UDP correct?

  • @S.Oliveira007
    @S.Oliveira007 2 года назад

    put translation options in the subtitles please, Chis. thanks

    • @ChrisGreer
      @ChrisGreer  2 года назад

      I will look at doing that - thank you for the suggestion!

  • @julesdeleuse5104
    @julesdeleuse5104 4 месяца назад

    13:55

  • @adamapeter4213
    @adamapeter4213 2 года назад

    Sir am using andrind phone i don't have laptop, what should i do, please help me out in my career.

    • @ChrisGreer
      @ChrisGreer  2 года назад

      Give www.cloudshark.io a try. It is a cloud-based version of Wireshark

  • @HalfInsaneOutdoorGuy
    @HalfInsaneOutdoorGuy 10 месяцев назад

    pickupline nobody gets, I am so nerd, that at the end of my date, I ask my girl for TFTP.

  • @anntakamaki1960
    @anntakamaki1960 Год назад

    Vsftpd 2.3.4 😬 😬

  • @samjones4327
    @samjones4327 Месяц назад

    Thanks a 4 sharing this valuable information! Cheers!

  • @danr4746
    @danr4746 День назад

    You lost me early.

  • @AlexanderMeier-iw7bz
    @AlexanderMeier-iw7bz 7 месяцев назад

    hello #MRGREER
    entire video very intriguing, but as a novice who searched RUclips: How To HTTP CUSTOM Android App, I seen this video.
    Question: How would the information you provided would help me with #HTTPCustom App ?
    #ThankYou #ChrisGreer

  • @seanlow9184
    @seanlow9184 Месяц назад