



Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Students as well as networking security personnels find this cheat sheet very useful
Typology: Cheat Sheet
1 / 6
This page cannot be seen from the preview
Don't miss anything!
(^1) University of Delhi, 2 Lucideus Technologies
riddhisuryavanshi11@gmail.com
This document is intended for students and security professionals as a quick reference for networking protocols. It covers 50 protocols classified according to the OSI Layer they operate on. The corresponding RFC has been provided to further check for parameters/commands of a particular protocol. From security perspective, the corresponding attacks/vulnerabilities are also included in this cheatsheet.
Protocol, Port, RFC, OSI Layer, Attack, Vulnerability
[1] Protocol- A protocol is a standard set of rules that allow electronic devices to communicate with each other. [2] Port- A logical construct that identifies a specific process or a type of network service. [3] RFC- A formal document from the Internet Engineering Task Force that is the result of committee drafting and subsequent review by interested parties. [4] OSI Layer- One of the seven layers of the Open Systems Interconnection Model that describes how information from a software application in one computer moves through a physical medium to the software application in another computer. [5] Attack: An information security threat that involves an attempt to obtain, alter, destroy, remove, implant or reveal information without authorized access or permission. [6] Vulnerability: A flaw in a system that can leave it open to attack.
DoS – Denial of Service MitM – Man in the Middle b/w – between MAC – Media Access Control VPN – Virtual Private Network N/W – Network VoIP – Voice over IP Aka – Also known as DROWN – Decrypting RSA using Obsolete and Weakened Encryption DDoS – Distributed Denial of Service
No.
PROTOCOL PORT(s) TCP/UDP port
1 IEEE 802.11 - -^ -^ Physical^ Specifies MAC & physical layer protocols for implementing WLAN Wi- Fi.
DoS by MAC address spoofing
2 PPTP (Point- to-Point Tunneling Protocol)
1723 Both 2637 Data Link (^) Implements VPN Uses TCP control channel and Generic Routing Encapsulation(GRE)
MitM Bit flipping
3 L2TP (Layer 2 Tunneling Protocol)
1701 Both 2661, 3931
Data Link Extension of PPP Uses UDP to avoid TCP meltdown problem.
DoS
4 PPP ( Point to Point Protocol)
Format string attack
5 ARP (Address Resolution Protocol)
ARP cache poisoning
(Reverse Address Resolution Protocol)
ARP Poisoning
(Internet Control Message Protocol)
Ping sweep Ping flood ICMP tunneling Forged ICMP redirects
(Internet Group Management Protocol)
DoS
9 OSPF^ (Open Shortest Path First)
Network (^) Routing protocol for IP networks. Uses link state routing algorithm. Part of interior gateway protocols (IGPs).
DoS Local authentication bypass
(Network Address Translation)
DoS Interception of internal & external traffic due to improper configuration.
21 RTP^ (Real- time Transport Protocol) , SRTP
Both 3550, 3711
Session (^) VoIP protocol. Delivers audio & video over IP networks.
RTP flooding attack RTP bleed
22 SSL (Secure Sockets Layer)
Renegotiation
23 TLS (Transport Layer Security)
Heartbleed 24 Kerberos^88 Both^1964 Presentation^ Provides security & authentication. Uses symmetric key distribution using symmetric encryption to access file server. Helps nodes to prove their identity to one another.
DoS Arbitrary code execution. Buffer Overflow.
25 WPA (Wi-Fi Protected Access)
(Multipurpose Internet Mail Extensions)
Presentation Supports text in multiple character sets; as well as attachments of audio, video, apps & images.
XSS using MIME Sniffing
27 ECHO 7 Both 862 Application (^) Used for testing & measurement of round trip timings in IP networks. Server sends back identical copy of the data it received.
Can perform DoS
(Dynamic Host Configuration Protocol)
Application (^) A network management protocol used to automate the process of configuring devices on IP networks.
Remote code execution Bogus DHCP client & server
29 BOOTP (Bootstrap Protocol)
67,68 Both 951 Application (^) Older version of DHCP. Automatically assigns IP address to network devices from a configuration server.
BootpD BOOTP server impersonation
30 HTTP (Hyper Text Transfer Protocol)
80 Both 1945 Application (^) Used for communication over World Wide Web.
MitM attack
(Hyper Text Transfer Protocol Secure)
443 Both - Application (^) HTTPS with SSL for security.
SSL Stripping DROWN attack
32 FTP (File Transfer Protocol)
20,21 Both 959, 2228
Application File transfer Uses TCP, hence file delivery is guaranteed.
Brute force attack Packet capture Anonymous authentication Directory traversal attack
with SSL)
989,990 Both 4217 Application (^) Uses command channel & opens new connections for data transfer. Requires a certificate.
MitM
File Transfer Protocol)
22 Both 913 Application (^) Uses encrypted credentials to authenticate. SSH keys can also be used to authenticate.
Brute force attack
35 POP3^ (Post Office Protocol)
110,995 Both 937, 1939
Application (^) Store-and-forward client/server protocol. Deletes mail on server as soon as user has downloaded it.
Buffer overflow in POP3 servers can cause DoS.
36 SSH (Secure Shell)
22 Both 4251 Application (^) Cryptographic network protocol for operating network services securely over an unsecured network.
Static SSH keys Embedded SSH keys can provide backdoor. 37 Telnet (TELecommun ication NETwork)
23 Both 15, 854, 855
Application (^) Allows to connect to remote computers over a TCP/IP network.
Brute force attack Stealing credentials by sniffing. SSH and SMTP banner grabbing. 38 NTP (Network Time Protocol)
123 Both 1059, 1119, 1305
Application (^) Synchronizes clock among devices.
Amplification DDoS attack. 39 IMAP/S (Internet Message Access Protocol)
Both 1176, 1730
Application Allows user to create folders & assign messages to folders. User can obtain just the message header (useful in low-bandwidth connection).
Password spraying attacks.
40 DNS (Domain Name System)
53 Both 1034, 1035
Application Resolute names in TCP/IP network.
Typosquatting DNS Poisoning. 41 SOAP (Simple Object Access Protocol)
80 Both - Application XML based messaging protocol to exchange info. Characteristics: extensibility, neutrality & independence.
SOAP injection Unauthenticated romote access
(Simple Network Management Protocol)
Both 1157, 1441, 2570
Application (^) Allows network manager to monitor networking equipment & remotely modify settings & configuration.
Sniffing of plain text password. Modification of packet header.
43 SMTP/S (Simple Mail Transfer Protocol)
Both; TCP
5321 Application Transfers mail from sender’s mail server to recipient’s mail server.
Account enumeration. E-mail header disclosures. Helps find internal IPs. 44 SNTP^ (Simple Network Time Protocol)
Application (^) Used when full implementation of NTP is not needed. Synchronizes a computer's system time with a server that has already been
DoS via a crafted NTP packet.