The "No Network is 100% Secure" series
- Port Scanning -
A White Paper
All rights reserved - may not be copied without permission
Easyrider LAN Pro, NOC Design Consultants
Contact Us
What is port scanning?: Port scanning is similar to a thief going through
your neighborhood and checking every door and window on each house to see which
ones are open and which ones are locked.
TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are two of
the protocols that make up the TCP/IP protocol suite which is used
to communicate on the Internet. Each of these has ports 0 through 65535 available
so essentially there are more than 130,000 doorknobs for burglars to jiggle.
The first 1024 TCP ports are called the Well-Known Ports and are associated with
standard services such as FTP, HTTP, SMTP or DNS. Some of the addresses over
1023 also have commonly associated services, but the majority of these ports are
not associated with any service and are available for a program or application to
use to communicate on.
Port scanning software, in its most basic state, simply sends out a request to
connect to the target computer on each port sequentially and makes a note of
which ports responded or seem open to more in-depth probing.
If a port scan is being done with malicious intent, the intruder would generally
prefer to go undetected. Network security applications can be configured to alert
administrators if they detect connection requests across a broad range of ports
from a single host. However, many port scanning programs provide the ability for
an intruder to perform these scans and not be detected.
Port scanning will determine which ports are open and which are not. An
intruder can then come back and target the open ports to see if they are vulnerable
to exploitation.
To help ensure that your network is protected and secure you may wish to perform
your own port scans. Once you find out what ports respond as being open you
should then determine whether its actually necessary for those ports to be
accessible from outside your network. If they're not necessary you should shut
them down or block them. Some (but very few) ports will indeed be required to be
open. You should then research what sorts of vulnerabilities and exploits your
network is open to by having these ports accessible and then apply the
appropriate patches or mitigation to protect your network as much as possible.
Having firewalls in place is no guarantee that your network is secure. If firewall
rules are lax or if logs are not being monitored, it can be very easy for a
cyber-burglar to learn all about your network, what kind of computers are in it,
what software is running and so on. And if an intruder can probe a port, they
can exploit it! Implementing tight firewall rules, shutting down services that
aren't needed and closing all unnecessary ports should be just the first steps
in your overall enterprise security plan. If you fail to do this, it will only be
a question of "when", not "if" your network will be broken into.
Easyrider LAN Pro has a lot of experience auditing sites and
determining how vulnerable they are to exploits. We also put on security
seminars in conjunction with our partner, Tektal, to help educate the IT
community regarding threats to their networks.
Next in the security white paper series:
Firewall White Paper
Virus White Paper
SPAM White Paper
Best Practices White Paper
Denial of Service DoS White Paper
Trojan Virus Attacks White Paper
Port Scanning White Paper
Shelfware White Paper
Last modified March 25, 2009
Copyright 1990-2009 Easyrider LAN Pro