SlideShare a Scribd company logo
4
Most read
15
Most read
19
Most read
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Name of Capstone Project
WEBSITE SCANNING
PARSHRAM NARVEKAR (AND-JUL2024-CSEH-1)
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Agenda
• Abstract
• Deliverables
• Code/tools
• PoC
• References
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Abstract
• To understanding what are the open ports in website and it’s function ,benefits and threats.
• The investigation of open ports on a website reveals critical insights into their functions, benefits, and
associated risks. Open ports enable essential communication for various services, such as HTTP, HTTPS,
FTP, and SSH, and are integral to the functionality of web-based systems. Their benefits include
improved connectivity, seamless data transfer, and support for secure communication protocols,
enhancing user experience and operational efficiency
• However, the study highlights that unmanaged or misconfigured open ports can pose significant
threats. These include vulnerabilities to unauthorized access, exploitation by malicious actors, and
susceptibility to cyber attacks such as DDoS, malware distribution, and data theft.
• The final outcome underscores the importance of balancing functionality and security. By identifying
open ports, organizations can implement best practices such as regular port scanning, use of firewalls,
and strict access controls to mitigate risks. This ensures a secure, efficient, and reliable network
environment, safeguarding both the organization’s assets and its users.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Deliverables:
• Site Name: umang.com / 35.212.62.35
• Category : Hosting/Cloud Services. It is a Part of the Google Cloud
Platform which is owned by Google LLC.
• Type : Typically commercial or technical infrastructure.
Hosting websites or applications deployed on Google
Compute Engine.
• Content : Providing endpoints for APIs hosted on Google Cloud.
Backend services like databases, machine learning APIs, or
other hosted resources.
Specifically, it is hosted under Google's Autonomous System
Number (ASN)
• Overall Ranking: Globally Renown
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Data Collection:-
www.umang.com website have currently using the following technologies
• CMS:-
WordPress
• CDN:-
Amazon CloudFront
• Domain parking
GoDaddy Parking
• Web Hostin Providers
Google Cloud
• Programming Language:-
jquery
Lazysizes
• Framework
Facebook Domain Verification
ASP.NET
OpenResty
• Web Server
NGINX
IIS
• Name Server
ns1
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Code/tools
• Nmap
• Builtwith
• nslookup
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Impact Analysis:-
• Open Ports and it’s Protocol and services
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Open Ports functions
1. Port 21 (FTP):- It is a File Transfer Protocol.
i. Used for file transfer between client and server.
ii. Typically for administrative use, such as
uploading or updating website files.
2. Port 25 (SMTP):-It is Simple Mail Transmission protocol
i. For email services associated with the website like
contact forms
ii. It Handles outgoing email traffic.
3. Port 80 (HTTP):-It is used as Hyper Text Transfer Protocol
i. Used for standard, unencrypted web traffic.
ii. Common to all websites that provide non-secure content.
4. Port 110 (POP3):- (Post Office Protocol Version 3).
i. Port 110 is used for POP3, which is used by email clients
to retrieve emails from the server. POP3 downloads
messages from the server to the client.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Open Ports functions
5. Port 143 (IMAP) :-It is Internet Message Access Protocol.
Port 143 is used for IMAP, another protocol for retrieving email from a server. IMAP
allows for better synchronization of messages across multiple devices (e.g., emails remain on
the server).
6. Port 443 (HTTPS):- It is Hyper Text Transfer Protocol.
Port 443 is used for HTTPS, which is the secure version of HTTP. It encrypts data using
SSL/TLS to ensure privacy and security between the client and server.
7. Port 465 (SMTPS):-It is Secure SMTP
Port 465 is used for SMTPS, which is a secure version of the SMTP protocol. It encrypts
email transmission with SSL/TLS.
8.Port 587 (SMTP with Authentication)
Port 587 is used for SMTP with STARTTLS encryption. It’s commonly used for sending email
securely with authentication.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Open Ports functions
9. Port 993 (IMAPS) :- Secure IMAPS
Port 993 is used for IMAPS, which is the secure version of IMAP. It encrypts email retrieval using
SSL/TLS.
10. Port 995 (POP3S):- Secure POP3S
Port 995 is used for POP3S, the secure version of POP3. It encrypts email retrieval using SSL/TLS.
11. Port 2525:- Alternative SMTP
Port 2525 is often used as an alternative port for SMTP, typically when Port 25 is blocked by ISPs to
prevent spam.
12. Port 3306 :- MySQL Database
Port 2525 is often used as an alternative port for SMTP, typically when Port 25 is blocked by
ISPs to prevent spam.
13. Port 5432 :- PostgreSQL
Port 5432 is used by PostgreSQL, an open-source relational database management system
(RDBMS), for database connections.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Benefits of Open ports.
1. Port 21 (FTP)
i. Simple to set up and use.
ii. Allows large file transfers and directory management.
iii. Widely supported by most devices and applications.
2. Port 25: (SMTP):-
i. Essential for email delivery between mail servers
ii. Well-supported and required for email routing.
3. Port 80 (HTTP):-
i. Widely used for hosting websites and web applications.
ii. Open by default for easy access to public content.
4. Port 110 (POP3):-
i. Allows offline access to emails after downloading.
ii. Simple to set up and use.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Benefits of Open Ports
5. Port 143 (IMAP)
i. Allows multi-device synchronization
ii. Keeps messages on the server, allowing users to access emails from any device.
6. Port 443 (HTTPS) :-
i. Secure data transmission, ensuring that sensitive information (e.g., login details, credit card information) is
protected.
ii. Strong encryption to prevent data interception or tampering.
7. Port 465 (SMTPS - Secure SMTP)
i. Secure email transmission ensures that sensitive data (e.g., credentials and email content) is encrypted during
transit.
ii. Prevents eavesdropping and data modification during email transmission
8. Port 587:- (SMTP with Authentication)
i. Ensures that emails are transmitted securely with encryption (via STARTTLS).
ii. Requires SMTP authentication, preventing unauthorized users from sending emails.
.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Benefits of Open Ports
9. Port 993:- (IMAPS - Secure IMAP)
i. Secure email retrieval protects data (including login credentials and message contents) from being intercepted.
ii. Synchronization of emails across multiple devices without compromising security.
10. Port 995 (POP3S - Secure POP3):-
i. Ensures secure email communication by encrypting credentials and email data during transmission.
ii. Allows offline email access while ensuring privacy.
11. Port 2525 (Alternative SMTP):-
i. Provides a fallback solution for sending emails when Port 25 is restricted by ISPs or firewalls.
ii. It’s often used by email services as an alternative to bypass Port 25 blocking.
12. Port 3306 (MySQL Database):-
i. Allows access to MySQL databases for running queries, managing data, and configuring applications.
ii. Standard port for MySQL database communication.
13. Port 5432 (PostgreSQL Database):-
i. Enables database access and management for applications that use PostgreSQL.
ii. Used by developers and administrators for querying and managing the database.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Threats of Open ports.
1. Port 21 :-
i. Unencrypted data transmission: FTP sends data (including usernames and passwords) in plain text, making it vulnerable to man-in-the-middle attacks and eavesdropping.
ii. Unauthorized access: If port 21 is left open to the public, it could allow hackers to gain unauthorized access to sensitive files on the server.
iii. Brute-force attacks: Attackers can try different combinations of usernames and passwords to break into the system.
2. Port 25:-
i. Spam: Open port 25 is often exploited for sending spam emails, especially if it’s open to the public.
ii. Denial of Service (DoS) attacks: Attackers can flood the mail server, causing service disruption.
iii. Spoofing: Attackers can spoof email addresses if the server is misconfigured.
3. Port 80:-
i. Unencrypted traffic: Data transmitted over HTTP is not encrypted, making it vulnerable to interception.
ii. Man-in-the-middle attacks: Attackers can intercept or modify traffic between client and server.
iii. Content injection: Attackers can inject malicious code (e.g., JavaScript or XSS attacks) into HTTP traffic.
4. Port 110:-
i.Unencrypted transmission: POP3 sends data (including credentials) in plain text, making it vulnerable to eavesdropping.
ii. Phishing: Attackers can spoof POP3 servers and steal user credentials.
5. Port 143:-
i. Unencrypted traffic: Like POP3, IMAP without encryption exposes sensitive data.
ii.Session hijacking: Without encryption, attackers can hijack the session and steal email credentials.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Threats of Open ports.
6. Port 443 (HTTPS - HyperText Transfer Protocol Secure):-
i. SSL/TLS vulnerabilities: If the server is misconfigured or uses outdated SSL/TLS protocols, it can be vulnerable to
attacks (e.g., POODLE, Heartbleed).
ii. Man-in-the-middle attacks: Although less likely, weak encryption or expired certificates can still leave the server
vulnerable.
7. Port 465 (SMTPS - Secure SMTP):-
i. Misconfiguration: Incorrect SSL/TLS configuration can still allow vulnerabilities.
ii. Outdated encryption: Using weak ciphers or expired certificates can expose the server to attacks.
8. Port 587 (SMTP with Authentication)
i. Misconfiguration: If STARTTLS is not correctly implemented, it can still be vulnerable to downgrade attacks.
ii. Open relays: If the mail server is misconfigured, it can allow anyone to send email through it, potentially enabling
spam.
9. Port 993 (IMAPS - Secure IMAP)
i. Weak encryption: If outdated encryption methods or weak ciphers are used, it could still be vulnerable to attacks.
ii. Misconfigured server: Incorrect configuration could lead to data leaks or unauthorized access.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Threats of Open Ports
10. Port 995 (POP3S - Secure POP3)
i. Outdated protocols: If an old version of SSL/TLS is used, the communication could be vulnerable.
ii. Misconfiguration: Like with POP3, improper setup could expose data to interception.
11. Port 2525 (Alternative SMTP)
i. Misuse for spam: Since Port 2525 is often used for bypassing spam filters, open access can sometimes be exploited by spammers.
ii. Security risks: As with any open port, if misconfigured, it can be vulnerable to unauthorized use.
12. Port 3306 (MySQL Database)
i. Unauthorized access: If this port is open to the public, attackers can attempt to exploit vulnerabilities in MySQL to gain unauthorized access
to the database.
ii. SQL injection: Poorly secured websites or applications using MySQL could be susceptible to SQL injection attacks.
iii. Data theft: Open MySQL ports can expose sensitive data stored in the database to unauthorized users.
13. Port 5432 (PostgreSQL Database)
i. Unauthorized access: Exposing this port to the public allows attackers to exploit PostgreSQL vulnerabilities.
ii. Data breaches: Without proper security measures, databases can be exposed to data theft and leakage.
iii. SQL injection: Similar to MySQL, if the application is poorly configured, attackers could exploit vulnerabilities in SQL queries.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Mitigation
• To prevent Unautharised access….
• Close Unnecessary Ports: Conduct regular port scans and close ports that are not needed for
operation.
• Use Firewalls: Configure firewalls to block unwanted traffic to open ports and only allow trusted
sources.
• Access Control: Restrict access to open ports to specific IP addresses or user groups using ACLs
(Access Control Lists).
• Enable Intrusion Detection Systems (IDS): Use IDS/IPS (Intrusion Prevention Systems) to monitor
traffic on open ports and anomalies.
• Implement Port Knocking: Require specific sequences of connection attempts to open ports
dynamically, adding a layer of security.
• Patch Management: Keep software and services listening on open ports up to date with security
patches.
• Regular Auditing: Use tools like Nmap or Nessus to regularly audit open ports and ensure
compliance with security policies.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Conclusion
• Open ports are indispensable for network operations but introduce
security risks. A proactive approach combining mitigation strategies with
regular audits and best practices can balance their utility with security
concerns.
• Open ports are a necessary component for networked systems to
communicate, but improper management can expose systems to risks.
Mitigation strategies include:
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Reference
• Kali Linux
• Builtwith.com
• GravityWrite.com
• ChatGpt
• Google Chrome
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Questions ?
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Thank You!

More Related Content

PPTX
Port Scanning: Unveiling the Hidden Doors of a Website
PPTX
Understanding Port Scanning: A Critical Tool in Web Security
PPTX
Website Port Scanning: Functions, Benefits, and Security Threats
PPTX
Website Port Scanning: Exploring Active Open Ports
PPTX
Comprehensive Website Port Scan: Functions, Benefits, and Security Threats
PPTX
Website Port Scanning: Functions, Benefits, and Threats of Open Ports
PPTX
Website Port Scanning: Functions, Benefits, and Threats of Open Ports
PPTX
Understanding Open Ports: Functions, Benefits, and Threats
Port Scanning: Unveiling the Hidden Doors of a Website
Understanding Port Scanning: A Critical Tool in Web Security
Website Port Scanning: Functions, Benefits, and Security Threats
Website Port Scanning: Exploring Active Open Ports
Comprehensive Website Port Scan: Functions, Benefits, and Security Threats
Website Port Scanning: Functions, Benefits, and Threats of Open Ports
Website Port Scanning: Functions, Benefits, and Threats of Open Ports
Understanding Open Ports: Functions, Benefits, and Threats

Similar to Website Scanning: Uncovering Vulnerabilities and Ensuring Cybersecurity (20)

PPTX
Ports and protocols
PPTX
20 Common Ports and their purposes
PPTX
Analyzing Open Ports on Websites: Functions, Benefits, Threats, and Detailed ...
PPTX
PPTX
20 common ports
PPTX
Suddala-Scan: Enhancing Website Analysis with AI for Capstone Project at Bost...
PPTX
Understanding Network Security and Vulnerability Assessment
PPTX
Scan Website Vulnerability - Project Presentation
PPTX
Ports and services
PPTX
Common ports hacked by hackers
DOCX
Ports and protocols
PPTX
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
PPTX
port forwarding.pptx
PDF
Common ports
PDF
Common Ports .pdf
PDF
Common port
PDF
Common ports
PDF
Common port
PDF
Puertos comunes
PPTX
Network Penetration Testing
Ports and protocols
20 Common Ports and their purposes
Analyzing Open Ports on Websites: Functions, Benefits, Threats, and Detailed ...
20 common ports
Suddala-Scan: Enhancing Website Analysis with AI for Capstone Project at Bost...
Understanding Network Security and Vulnerability Assessment
Scan Website Vulnerability - Project Presentation
Ports and services
Common ports hacked by hackers
Ports and protocols
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
port forwarding.pptx
Common ports
Common Ports .pdf
Common port
Common ports
Common port
Puertos comunes
Network Penetration Testing
Ad

More from Boston Institute of Analytics (20)

PPTX
"Predicting Employee Retention: A Data-Driven Approach to Enhancing Workforce...
PPTX
"Ecommerce Customer Segmentation & Prediction: Enhancing Business Strategies ...
PPTX
Music Recommendation System: A Data Science Project for Personalized Listenin...
PPTX
Mental Wellness Analyzer: Leveraging Data for Better Mental Health Insights -...
PPTX
Fraud Detection in Cybersecurity: Advanced Techniques for Safeguarding Digita...
PPTX
Enhancing Brand Presence Through Social Media Marketing: A Strategic Approach...
PPTX
Employee Retention Prediction: Leveraging Data for Workforce Stability
PPTX
Predicting Movie Success: Unveiling Box Office Potential with Data Analytics
PPTX
Financial Fraud Detection: Identifying and Preventing Financial Fraud
PPTX
Smart Driver Alert: Predictive Fatigue Detection Technology
PPTX
Smart Driver Alert: Predictive Fatigue Detection Technology
PPTX
E-Commerce Customer Segmentation and Prediction: Unlocking Insights for Smart...
PPTX
Predictive Maintenance: Revolutionizing Vehicle Care with Demographic and Sen...
PPTX
Smart Driver Alert: Revolutionizing Road Safety with Predictive Fatigue Detec...
PDF
Water Potability Prediction: Ensuring Safe and Clean Water
PDF
Developing a Training Program for Employee Skill Enhancement
PPTX
Designing a Simple Python Tool for Website Vulnerability Scanning
PPTX
Building a Simple Python-Based Website Vulnerability Scanner
PPTX
Cybersecurity and Ethical Hacking: Capstone Project
PPTX
Fraud Detection: Harnessing Data Science for Securing Transactions
"Predicting Employee Retention: A Data-Driven Approach to Enhancing Workforce...
"Ecommerce Customer Segmentation & Prediction: Enhancing Business Strategies ...
Music Recommendation System: A Data Science Project for Personalized Listenin...
Mental Wellness Analyzer: Leveraging Data for Better Mental Health Insights -...
Fraud Detection in Cybersecurity: Advanced Techniques for Safeguarding Digita...
Enhancing Brand Presence Through Social Media Marketing: A Strategic Approach...
Employee Retention Prediction: Leveraging Data for Workforce Stability
Predicting Movie Success: Unveiling Box Office Potential with Data Analytics
Financial Fraud Detection: Identifying and Preventing Financial Fraud
Smart Driver Alert: Predictive Fatigue Detection Technology
Smart Driver Alert: Predictive Fatigue Detection Technology
E-Commerce Customer Segmentation and Prediction: Unlocking Insights for Smart...
Predictive Maintenance: Revolutionizing Vehicle Care with Demographic and Sen...
Smart Driver Alert: Revolutionizing Road Safety with Predictive Fatigue Detec...
Water Potability Prediction: Ensuring Safe and Clean Water
Developing a Training Program for Employee Skill Enhancement
Designing a Simple Python Tool for Website Vulnerability Scanning
Building a Simple Python-Based Website Vulnerability Scanner
Cybersecurity and Ethical Hacking: Capstone Project
Fraud Detection: Harnessing Data Science for Securing Transactions
Ad

Recently uploaded (20)

PPTX
Session 14-16. Capital Structure Theories.pptx
PDF
ABriefOverviewComparisonUCP600_ISP8_URDG_758.pdf
PPTX
Introduction to Essence of Indian traditional knowledge.pptx
PDF
Corporate Finance Fundamentals - Course Presentation.pdf
PDF
1a In Search of the Numbers ssrn 1488130 Oct 2009.pdf
PDF
Chapter 9 IFRS Ed-Ed4_2020 Intermediate Accounting
PDF
caregiving tools.pdf...........................
PDF
Dr Tran Quoc Bao the first Vietnamese speaker at GITEX DigiHealth Conference ...
PPT
E commerce busin and some important issues
PDF
Spending, Allocation Choices, and Aging THROUGH Retirement. Are all of these ...
PDF
NAPF_RESPONSE_TO_THE_PENSIONS_COMMISSION_8 _2_.pdf
PDF
discourse-2025-02-building-a-trillion-dollar-dream.pdf
PDF
Bitcoin Layer August 2025: Power Laws of Bitcoin: The Core and Bubbles
PPTX
Globalization-of-Religion. Contemporary World
PPTX
social-studies-subject-for-high-school-globalization.pptx
PDF
ECONOMICS AND ENTREPRENEURS LESSONSS AND
PDF
Q2 2025 :Lundin Gold Conference Call Presentation_Final.pdf
PDF
how_to_earn_50k_monthly_investment_guide.pdf
PPTX
Basic Concepts of Economics.pvhjkl;vbjkl;ptx
PDF
illuminati Uganda brotherhood agent in Kampala call 0756664682,0782561496
Session 14-16. Capital Structure Theories.pptx
ABriefOverviewComparisonUCP600_ISP8_URDG_758.pdf
Introduction to Essence of Indian traditional knowledge.pptx
Corporate Finance Fundamentals - Course Presentation.pdf
1a In Search of the Numbers ssrn 1488130 Oct 2009.pdf
Chapter 9 IFRS Ed-Ed4_2020 Intermediate Accounting
caregiving tools.pdf...........................
Dr Tran Quoc Bao the first Vietnamese speaker at GITEX DigiHealth Conference ...
E commerce busin and some important issues
Spending, Allocation Choices, and Aging THROUGH Retirement. Are all of these ...
NAPF_RESPONSE_TO_THE_PENSIONS_COMMISSION_8 _2_.pdf
discourse-2025-02-building-a-trillion-dollar-dream.pdf
Bitcoin Layer August 2025: Power Laws of Bitcoin: The Core and Bubbles
Globalization-of-Religion. Contemporary World
social-studies-subject-for-high-school-globalization.pptx
ECONOMICS AND ENTREPRENEURS LESSONSS AND
Q2 2025 :Lundin Gold Conference Call Presentation_Final.pdf
how_to_earn_50k_monthly_investment_guide.pdf
Basic Concepts of Economics.pvhjkl;vbjkl;ptx
illuminati Uganda brotherhood agent in Kampala call 0756664682,0782561496

Website Scanning: Uncovering Vulnerabilities and Ensuring Cybersecurity

  • 1. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Name of Capstone Project WEBSITE SCANNING PARSHRAM NARVEKAR (AND-JUL2024-CSEH-1)
  • 2. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Agenda • Abstract • Deliverables • Code/tools • PoC • References
  • 3. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Abstract • To understanding what are the open ports in website and it’s function ,benefits and threats. • The investigation of open ports on a website reveals critical insights into their functions, benefits, and associated risks. Open ports enable essential communication for various services, such as HTTP, HTTPS, FTP, and SSH, and are integral to the functionality of web-based systems. Their benefits include improved connectivity, seamless data transfer, and support for secure communication protocols, enhancing user experience and operational efficiency • However, the study highlights that unmanaged or misconfigured open ports can pose significant threats. These include vulnerabilities to unauthorized access, exploitation by malicious actors, and susceptibility to cyber attacks such as DDoS, malware distribution, and data theft. • The final outcome underscores the importance of balancing functionality and security. By identifying open ports, organizations can implement best practices such as regular port scanning, use of firewalls, and strict access controls to mitigate risks. This ensures a secure, efficient, and reliable network environment, safeguarding both the organization’s assets and its users.
  • 4. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Deliverables: • Site Name: umang.com / 35.212.62.35 • Category : Hosting/Cloud Services. It is a Part of the Google Cloud Platform which is owned by Google LLC. • Type : Typically commercial or technical infrastructure. Hosting websites or applications deployed on Google Compute Engine. • Content : Providing endpoints for APIs hosted on Google Cloud. Backend services like databases, machine learning APIs, or other hosted resources. Specifically, it is hosted under Google's Autonomous System Number (ASN) • Overall Ranking: Globally Renown
  • 5. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Data Collection:- www.umang.com website have currently using the following technologies • CMS:- WordPress • CDN:- Amazon CloudFront • Domain parking GoDaddy Parking • Web Hostin Providers Google Cloud • Programming Language:- jquery Lazysizes • Framework Facebook Domain Verification ASP.NET OpenResty • Web Server NGINX IIS • Name Server ns1
  • 6. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Code/tools • Nmap • Builtwith • nslookup
  • 7. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Impact Analysis:- • Open Ports and it’s Protocol and services
  • 8. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Open Ports functions 1. Port 21 (FTP):- It is a File Transfer Protocol. i. Used for file transfer between client and server. ii. Typically for administrative use, such as uploading or updating website files. 2. Port 25 (SMTP):-It is Simple Mail Transmission protocol i. For email services associated with the website like contact forms ii. It Handles outgoing email traffic. 3. Port 80 (HTTP):-It is used as Hyper Text Transfer Protocol i. Used for standard, unencrypted web traffic. ii. Common to all websites that provide non-secure content. 4. Port 110 (POP3):- (Post Office Protocol Version 3). i. Port 110 is used for POP3, which is used by email clients to retrieve emails from the server. POP3 downloads messages from the server to the client.
  • 9. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Open Ports functions 5. Port 143 (IMAP) :-It is Internet Message Access Protocol. Port 143 is used for IMAP, another protocol for retrieving email from a server. IMAP allows for better synchronization of messages across multiple devices (e.g., emails remain on the server). 6. Port 443 (HTTPS):- It is Hyper Text Transfer Protocol. Port 443 is used for HTTPS, which is the secure version of HTTP. It encrypts data using SSL/TLS to ensure privacy and security between the client and server. 7. Port 465 (SMTPS):-It is Secure SMTP Port 465 is used for SMTPS, which is a secure version of the SMTP protocol. It encrypts email transmission with SSL/TLS. 8.Port 587 (SMTP with Authentication) Port 587 is used for SMTP with STARTTLS encryption. It’s commonly used for sending email securely with authentication.
  • 10. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Open Ports functions 9. Port 993 (IMAPS) :- Secure IMAPS Port 993 is used for IMAPS, which is the secure version of IMAP. It encrypts email retrieval using SSL/TLS. 10. Port 995 (POP3S):- Secure POP3S Port 995 is used for POP3S, the secure version of POP3. It encrypts email retrieval using SSL/TLS. 11. Port 2525:- Alternative SMTP Port 2525 is often used as an alternative port for SMTP, typically when Port 25 is blocked by ISPs to prevent spam. 12. Port 3306 :- MySQL Database Port 2525 is often used as an alternative port for SMTP, typically when Port 25 is blocked by ISPs to prevent spam. 13. Port 5432 :- PostgreSQL Port 5432 is used by PostgreSQL, an open-source relational database management system (RDBMS), for database connections.
  • 11. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Benefits of Open ports. 1. Port 21 (FTP) i. Simple to set up and use. ii. Allows large file transfers and directory management. iii. Widely supported by most devices and applications. 2. Port 25: (SMTP):- i. Essential for email delivery between mail servers ii. Well-supported and required for email routing. 3. Port 80 (HTTP):- i. Widely used for hosting websites and web applications. ii. Open by default for easy access to public content. 4. Port 110 (POP3):- i. Allows offline access to emails after downloading. ii. Simple to set up and use.
  • 12. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Benefits of Open Ports 5. Port 143 (IMAP) i. Allows multi-device synchronization ii. Keeps messages on the server, allowing users to access emails from any device. 6. Port 443 (HTTPS) :- i. Secure data transmission, ensuring that sensitive information (e.g., login details, credit card information) is protected. ii. Strong encryption to prevent data interception or tampering. 7. Port 465 (SMTPS - Secure SMTP) i. Secure email transmission ensures that sensitive data (e.g., credentials and email content) is encrypted during transit. ii. Prevents eavesdropping and data modification during email transmission 8. Port 587:- (SMTP with Authentication) i. Ensures that emails are transmitted securely with encryption (via STARTTLS). ii. Requires SMTP authentication, preventing unauthorized users from sending emails. .
  • 13. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Benefits of Open Ports 9. Port 993:- (IMAPS - Secure IMAP) i. Secure email retrieval protects data (including login credentials and message contents) from being intercepted. ii. Synchronization of emails across multiple devices without compromising security. 10. Port 995 (POP3S - Secure POP3):- i. Ensures secure email communication by encrypting credentials and email data during transmission. ii. Allows offline email access while ensuring privacy. 11. Port 2525 (Alternative SMTP):- i. Provides a fallback solution for sending emails when Port 25 is restricted by ISPs or firewalls. ii. It’s often used by email services as an alternative to bypass Port 25 blocking. 12. Port 3306 (MySQL Database):- i. Allows access to MySQL databases for running queries, managing data, and configuring applications. ii. Standard port for MySQL database communication. 13. Port 5432 (PostgreSQL Database):- i. Enables database access and management for applications that use PostgreSQL. ii. Used by developers and administrators for querying and managing the database.
  • 14. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Threats of Open ports. 1. Port 21 :- i. Unencrypted data transmission: FTP sends data (including usernames and passwords) in plain text, making it vulnerable to man-in-the-middle attacks and eavesdropping. ii. Unauthorized access: If port 21 is left open to the public, it could allow hackers to gain unauthorized access to sensitive files on the server. iii. Brute-force attacks: Attackers can try different combinations of usernames and passwords to break into the system. 2. Port 25:- i. Spam: Open port 25 is often exploited for sending spam emails, especially if it’s open to the public. ii. Denial of Service (DoS) attacks: Attackers can flood the mail server, causing service disruption. iii. Spoofing: Attackers can spoof email addresses if the server is misconfigured. 3. Port 80:- i. Unencrypted traffic: Data transmitted over HTTP is not encrypted, making it vulnerable to interception. ii. Man-in-the-middle attacks: Attackers can intercept or modify traffic between client and server. iii. Content injection: Attackers can inject malicious code (e.g., JavaScript or XSS attacks) into HTTP traffic. 4. Port 110:- i.Unencrypted transmission: POP3 sends data (including credentials) in plain text, making it vulnerable to eavesdropping. ii. Phishing: Attackers can spoof POP3 servers and steal user credentials. 5. Port 143:- i. Unencrypted traffic: Like POP3, IMAP without encryption exposes sensitive data. ii.Session hijacking: Without encryption, attackers can hijack the session and steal email credentials.
  • 15. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Threats of Open ports. 6. Port 443 (HTTPS - HyperText Transfer Protocol Secure):- i. SSL/TLS vulnerabilities: If the server is misconfigured or uses outdated SSL/TLS protocols, it can be vulnerable to attacks (e.g., POODLE, Heartbleed). ii. Man-in-the-middle attacks: Although less likely, weak encryption or expired certificates can still leave the server vulnerable. 7. Port 465 (SMTPS - Secure SMTP):- i. Misconfiguration: Incorrect SSL/TLS configuration can still allow vulnerabilities. ii. Outdated encryption: Using weak ciphers or expired certificates can expose the server to attacks. 8. Port 587 (SMTP with Authentication) i. Misconfiguration: If STARTTLS is not correctly implemented, it can still be vulnerable to downgrade attacks. ii. Open relays: If the mail server is misconfigured, it can allow anyone to send email through it, potentially enabling spam. 9. Port 993 (IMAPS - Secure IMAP) i. Weak encryption: If outdated encryption methods or weak ciphers are used, it could still be vulnerable to attacks. ii. Misconfigured server: Incorrect configuration could lead to data leaks or unauthorized access.
  • 16. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Threats of Open Ports 10. Port 995 (POP3S - Secure POP3) i. Outdated protocols: If an old version of SSL/TLS is used, the communication could be vulnerable. ii. Misconfiguration: Like with POP3, improper setup could expose data to interception. 11. Port 2525 (Alternative SMTP) i. Misuse for spam: Since Port 2525 is often used for bypassing spam filters, open access can sometimes be exploited by spammers. ii. Security risks: As with any open port, if misconfigured, it can be vulnerable to unauthorized use. 12. Port 3306 (MySQL Database) i. Unauthorized access: If this port is open to the public, attackers can attempt to exploit vulnerabilities in MySQL to gain unauthorized access to the database. ii. SQL injection: Poorly secured websites or applications using MySQL could be susceptible to SQL injection attacks. iii. Data theft: Open MySQL ports can expose sensitive data stored in the database to unauthorized users. 13. Port 5432 (PostgreSQL Database) i. Unauthorized access: Exposing this port to the public allows attackers to exploit PostgreSQL vulnerabilities. ii. Data breaches: Without proper security measures, databases can be exposed to data theft and leakage. iii. SQL injection: Similar to MySQL, if the application is poorly configured, attackers could exploit vulnerabilities in SQL queries.
  • 17. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Mitigation • To prevent Unautharised access…. • Close Unnecessary Ports: Conduct regular port scans and close ports that are not needed for operation. • Use Firewalls: Configure firewalls to block unwanted traffic to open ports and only allow trusted sources. • Access Control: Restrict access to open ports to specific IP addresses or user groups using ACLs (Access Control Lists). • Enable Intrusion Detection Systems (IDS): Use IDS/IPS (Intrusion Prevention Systems) to monitor traffic on open ports and anomalies. • Implement Port Knocking: Require specific sequences of connection attempts to open ports dynamically, adding a layer of security. • Patch Management: Keep software and services listening on open ports up to date with security patches. • Regular Auditing: Use tools like Nmap or Nessus to regularly audit open ports and ensure compliance with security policies.
  • 18. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Conclusion • Open ports are indispensable for network operations but introduce security risks. A proactive approach combining mitigation strategies with regular audits and best practices can balance their utility with security concerns. • Open ports are a necessary component for networked systems to communicate, but improper management can expose systems to risks. Mitigation strategies include:
  • 19. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Reference • Kali Linux • Builtwith.com • GravityWrite.com • ChatGpt • Google Chrome
  • 20. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Questions ?
  • 21. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Thank You!