Tagged articles
32 articles
Page 1 of 1
Java Tech Enthusiast
Java Tech Enthusiast
Dec 21, 2025 · Information Security

Ultimate Guide to Common Network Ports, Attack Vectors, and Defense Strategies

This article explains what network ports are, classifies well‑known, registered and dynamic ports, demonstrates scanning tools and commands, details common attack techniques such as buffer overflow, DoS and MITM, and provides practical hardening recommendations for the most frequently targeted ports.

Vulnerabilityattack methodsdefense
0 likes · 29 min read
Ultimate Guide to Common Network Ports, Attack Vectors, and Defense Strategies
Java Architect Handbook
Java Architect Handbook
Dec 4, 2025 · Information Security

Using nmap4j in Java to Scan Ports and Identify Services

This guide explains how to integrate the nmap4j library into Java projects to perform Nmap‑based port scanning, service detection, and OS identification, covering prerequisite setup, key command‑line flags, Windows and Linux implementations, and parsing XML results with Dom4j.

javanetwork securitynmap4j
0 likes · 14 min read
Using nmap4j in Java to Scan Ports and Identify Services
Open Source Linux
Open Source Linux
Mar 20, 2025 · Information Security

30 High‑Risk Ports to Secure and How to Safely Close Them

This guide lists thirty commonly exposed high‑risk ports, explains the security threats each poses, and provides practical firewall, service‑management, and closure steps to help you harden your systems against attacks.

System Hardeninghigh-risk portsnetwork security
0 likes · 7 min read
30 High‑Risk Ports to Secure and How to Safely Close Them
Efficient Ops
Efficient Ops
Mar 12, 2025 · Information Security

30 High-Risk Ports You Must Secure and How to Close Them

This guide lists 30 commonly exposed high‑risk ports such as LDAP, MySQL, and Docker, explains the security threats they pose, and provides practical firewall, service‑management, and port‑closing steps—including command‑line examples—to help you harden your systems against attacks.

System Hardeningfirewallhigh-risk ports
0 likes · 7 min read
30 High-Risk Ports You Must Secure and How to Close Them
BirdNest Tech Talk
BirdNest Tech Talk
Jan 31, 2025 · Information Security

Building a Go TCP Scanner to Discover Unauthenticated ClickHouse Services

This article walks through creating a Go‑based TCP SYN scanner to locate public IPs with port 9000 open, verifies whether they run ClickHouse without authentication, and shares the full code, command‑line steps, and scan results that reveal only a handful of vulnerable instances.

GoTCP scanningclickhouse
0 likes · 16 min read
Building a Go TCP Scanner to Discover Unauthenticated ClickHouse Services
Liangxu Linux
Liangxu Linux
Oct 27, 2024 · Information Security

Unlocking the Secrets of Network Ports: Risks, Attacks, and Defense Strategies

This comprehensive guide explains what network ports are, categorizes well‑known, registered, and dynamic ports, demonstrates common scanning tools and commands, details typical hacker techniques such as SYN scans, buffer overflows, DoS attacks, and provides practical firewall, IDS, and authentication hardening measures for each vulnerable service.

network portsnetwork securityport scanning
0 likes · 31 min read
Unlocking the Secrets of Network Ports: Risks, Attacks, and Defense Strategies
MaGe Linux Operations
MaGe Linux Operations
Oct 1, 2024 · Information Security

Master Nmap: Essential Commands and Scanning Techniques Explained

This guide walks through common Nmap commands, explains key options such as -A, -T4, and -sn, demonstrates host discovery, port and service detection, OS fingerprinting, and provides practical examples with output screenshots to help readers efficiently assess network security.

Network ScanningOS detectionhost discovery
0 likes · 15 min read
Master Nmap: Essential Commands and Scanning Techniques Explained
Open Source Linux
Open Source Linux
Aug 14, 2024 · Information Security

Master Nmap: Step-by-Step Guide to Scanning Linux Ports

This guide explains how to use Nmap on Linux to perform simple, single‑port, full‑range, and custom port scans, interpret common port states, and understand typical service ports for effective network security testing.

Linuxnetwork securitynmap
0 likes · 7 min read
Master Nmap: Step-by-Step Guide to Scanning Linux Ports
Liangxu Linux
Liangxu Linux
Jul 17, 2024 · Operations

How to Detect Open UDP Ports with hping3 and netcat on Linux

This guide shows how to set up a Ubuntu server and a CentOS client, install hping3 and netcat, and use them to reliably detect whether specific UDP ports are open or closed, interpreting packet loss, ICMP Port Unreachable, and connection refusal messages.

LinuxUDPhping3
0 likes · 5 min read
How to Detect Open UDP Ports with hping3 and netcat on Linux
vivo Internet Technology
vivo Internet Technology
Oct 31, 2023 · Information Security

Network Port Security: Risks, Attack Methods, and Governance Practices

Network port security demands continuous discovery, automated vulnerability scanning, traffic‑baseline anomaly detection, and disciplined governance—including source authentication, first‑packet drop, and lifecycle management—to mitigate DDoS, application‑layer, and exploitation attacks while ensuring minimal‑privilege openings and timely closure.

CC AttackDDoSVulnerability Management
0 likes · 25 min read
Network Port Security: Risks, Attack Methods, and Governance Practices
Software Development Quality
Software Development Quality
Jun 13, 2023 · Information Security

How to Perform Anonymous Online Port Scans with Scanless

This guide introduces Scanless, a Python‑based tool that leverages third‑party online scanners to conduct anonymous port scans, explains how to install it via Git and pip, demonstrates command‑line usage and Docker support, and lists the supported scanning services.

DockerPythonanonymous scanning
0 likes · 3 min read
How to Perform Anonymous Online Port Scans with Scanless
IT Services Circle
IT Services Circle
Apr 10, 2022 · Information Security

Building a Simple Python Port Scanner in 20 Lines

This tutorial explains how to create a lightweight Python port scanner using only standard libraries, covering required imports, command‑line host input, a full‑range port loop with socket connections, result handling, and runtime measurement, all within a concise 20‑line script.

Pythonnetwork securityport scanning
0 likes · 4 min read
Building a Simple Python Port Scanner in 20 Lines
Liangxu Linux
Liangxu Linux
Mar 20, 2022 · Information Security

Master Ncat on CentOS: Install, Test Ports, Chat, and Simple Web Server

This guide explains how to install the ncat package on CentOS 7/8, use it to check TCP connections, set up listening ports, run a basic chat service, probe SSH versions, create a backdoor, and serve static web pages, providing concrete commands and example outputs for each task.

CentOScommand-linencat
0 likes · 7 min read
Master Ncat on CentOS: Install, Test Ports, Chat, and Simple Web Server
Open Source Linux
Open Source Linux
Nov 24, 2021 · Information Security

Mastering Port Penetration: From Scanning to Exploitation

This comprehensive guide explains how to improve penetration testing efficiency by focusing on port enumeration, banner grabbing, service identification, default port knowledge, and a variety of attack techniques—including brute‑force, exploitation of known vulnerabilities, and protocol‑specific tricks—across common network services and applications.

brute forcenmappenetration testing
0 likes · 19 min read
Mastering Port Penetration: From Scanning to Exploitation
MaGe Linux Operations
MaGe Linux Operations
Jul 31, 2020 · Information Security

Build a Python TCP Port Scanner with Multithreading and Nmap

This article demonstrates how to build a Python TCP port scanner using raw sockets, adds service fingerprinting by sending probes, speeds up scans with multithreading, and shows an alternative approach using the nmap library, complete with example code and sample output.

multithreadingnmapport scanning
0 likes · 5 min read
Build a Python TCP Port Scanner with Multithreading and Nmap
ITPUB
ITPUB
Apr 1, 2020 · Operations

Master Netcat: Essential TCP/UDP Tricks for Port Testing, File Transfer, and More

This guide explains how to use the lightweight netcat utility for a wide range of network tasks—including checking versions, testing TCP and UDP ports, transferring files, measuring bandwidth, and even creating simple backdoors—while providing concrete command examples and practical tips for Linux environments.

TCPfile transfernetcat
0 likes · 13 min read
Master Netcat: Essential TCP/UDP Tricks for Port Testing, File Transfer, and More
ITPUB
ITPUB
Mar 26, 2020 · Information Security

How to Quickly Identify Open Ports on Linux Using Nmap, Netcat, and Bash

This guide explains multiple practical methods for discovering which ports are open on a Linux system, covering Nmap scans, Netcat probing, and Bash pseudo‑device checks, complete with command examples, option details, and output interpretation.

BashLinuxnetcat
0 likes · 8 min read
How to Quickly Identify Open Ports on Linux Using Nmap, Netcat, and Bash
Liangxu Linux
Liangxu Linux
May 12, 2019 · Operations

Automate Multi‑Server Port Scanning with Shell & Netcat

Learn how to use the netcat (nc) command together with simple shell scripts to efficiently check whether one or multiple ports are open across a list of servers, eliminating manual checks and speeding up network diagnostics for both single‑port and multi‑port scans.

LinuxNetwork DiagnosticsShell
0 likes · 7 min read
Automate Multi‑Server Port Scanning with Shell & Netcat
MaGe Linux Operations
MaGe Linux Operations
Jul 25, 2018 · Information Security

Master Port Scanning, Subdomain Enumeration, and CMS Fingerprinting with Python

This article explains the principles of port scanning, lists common service ports and their states, demonstrates nmap usage, and provides both single‑threaded and multithreaded Python scripts for port scanning, followed by three Python‑based subdomain collection methods and two approaches for CMS fingerprinting, complete with code examples.

CMS fingerprintingSubdomain Enumerationnetwork security
0 likes · 16 min read
Master Port Scanning, Subdomain Enumeration, and CMS Fingerprinting with Python
Meituan Technology Team
Meituan Technology Team
Oct 26, 2017 · Information Security

External Network Port Monitoring: Evolution, Methods, and Best Practices

The article chronicles Meituan‑Dianping’s external network port monitoring evolution—from slow Python‑driven Nmap scans to a fast Masscan‑Nmap pipeline and real‑time traffic‑driven DPDK module—explaining black‑box scanning, white‑box analysis, best‑practice recommendations, and the critical role of continuous port visibility for security.

Security OperationsTCP SYNmasscan
0 likes · 13 min read
External Network Port Monitoring: Evolution, Methods, and Best Practices