Security Basics mailing list archives

RE: Web ports list


From: "Burton M. Strauss III" <BStrauss () acm org>
Date: Thu, 9 Sep 2004 10:08:39 -0500

But remember that there's no REQUIREMENT to use any specific port.  The
reason for using a 'well known' port is so people can find the proxy with
ease.

If that's not important, anything goes - all the port # is, is an agreement
between the client and the proxy.

If I want to set my proxy up on 21, I can do it, even though it may break
FTP.

-----Burton

-----Original Message-----
From: Bénoni MARTIN [mailto:Benoni.MARTIN () libertis ga]
Sent: Tuesday, September 07, 2004 5:53 AM
To: security-basics () securityfocus com
Subject: Web ports list


Hi List !

I am developping a software and I need to have the most complete
list of the usual web ports used by servers and proxys.

For the moment, I have this:

      80, 81, 88, 98, 443, 1085, 1381, 3128, 8000, 8010, 8080,
8090, 8383, 9090, 10000

If I miss something ...

Thanks !

------------------------------------------------------------------
---------
Computer Forensics Training at the InfoSec Institute. All of our
class sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the
in-demand skills of
a certified computer examiner, learn to recover trace data left behind by
fraud, theft, and cybercrime perpetrators. Discover the source of computer
crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.html
------------------------------------------------------------------
----------



---------------------------------------------------------------------------
Computer Forensics Training at the InfoSec Institute. All of our class sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand skills of
a certified computer examiner, learn to recover trace data left behind by
fraud, theft, and cybercrime perpetrators. Discover the source of computer
crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.html
----------------------------------------------------------------------------


Current thread: