So this Blog is intended to give an overview of how people should view results when they receive a Penetration test / vulnerability assessment report and how to deal with “Ports Found” on a Penetration Test / Vulnerability Assessment. This is a fairly wide ranging topic depending on your setup so if there is any additional information we miss then feel free to get in touch via the comments and we will clarify anything for you.
We wrote a blog called “Common Ways Hackers Can Get Into Your System”. Read this before you start as it gives a good overview as to who are the types of adversaries and how they might attack. However below we will just concentrate on the actual specifics around test reports and technically how you should approach the subject of “Open Ports”.
So if you have done an external Penetration Test or Vulnerability Scan and you have found you have Ports Open then this doesn’t mean the end of the world but it does mean that you have to ask yourself some questions.
A port open effectively means that the Firewall or Router device that protects your network has an open channel (or port) on it that will allow traffic to flow through to the internal network. This is usually called network address translation or “NAT” and effectively redirects traffic requested on that IP address for that port to a service listening either within the network or on the actual router itself.
The IP Address externally could be 82.3.6X.XX (“X” used to hide real IP) with Port Number 80.
Now in this above example the router which has “82.3.6X.XX” as its external IP address if anyone makes a request on that IP for Port 80 it will redirect the traffic from outside the network to inside the network to an internal server that is terminating port 80.
Effectively the router can be directing external traffic for Port 80 from the external address of 82.3.6X.XX to an internal address of 192.168.10.1 which for this example’s sake is a webserver that is listening on Port 80 (which is a web traffic Port).
So if you have Ports Open in your report which basically means that you are accepting connections from outside your network to inside your network then you are effectively exposing to the outside world the service (piece of software) which is listening inside your network.
If this “piece of software” that is listening inside your network is super secure, up to date and designed to thwart of external attack then “great” however if this particular service that is exposed to the world is vulnerable, weak, old and “un-patched” then this is what attackers will try to exploit to get into your network.
iana is the global repository if there is a specific port you would like to lookup, common software will use the same ports but not always.
So just because you have open ports, this is not the end of the world and in fact super needed if you have critical systems which requires data to move from external RAW internet to an internal network. However please see below for some considerations around this:
Please feel free to contact us if you have any questions on this Blog.
About the Author: Terry Lewis a 25-year Tech Entrepreneur and Technology Blogger.
“I’m lucky to of worked in technology all over the world for large multi-national organisations, in recent years I have built technology brands and developed products to help make technology that bit easier for people to grasp and manage. By day I run tech businesses, by night (as soon as the kids have gone to bed) I write code and I love building Cyber Security technology.