You are viewing a free preview of this lesson.
Subscribe to unlock all 10 lessons in this course and every other course on LearningBro.
Scanning and enumeration build on reconnaissance by actively probing the target to discover open ports, running services, operating systems, and potential vulnerabilities. This phase transforms the information gathered during recon into actionable intelligence for exploitation.
Every networked service listens on a port (0–65535). Port scanning identifies which ports are open and what services are running:
| Port | Protocol | Service |
|---|---|---|
| 21 | TCP | FTP (File Transfer Protocol) |
| 22 | TCP | SSH (Secure Shell) |
| 23 | TCP | Telnet |
| 25 | TCP | SMTP (Email) |
| 53 | TCP/UDP | DNS |
| 80 | TCP | HTTP |
| 110 | TCP | POP3 (Email) |
| 139/445 | TCP | SMB (File Sharing) |
| 443 | TCP | HTTPS |
| 3306 | TCP | MySQL |
| 3389 | TCP | RDP (Remote Desktop) |
| 5432 | TCP | PostgreSQL |
| 8080 | TCP | HTTP Proxy / Alternative HTTP |
Subscribe to continue reading
Get full access to this lesson and all 10 lessons in this course.