# Network Pentesting

- [FTP - Port 21](https://www.verylazytech.com/network-pentesting/ftp-port-21.md)
- [SSH- Port 22](https://www.verylazytech.com/network-pentesting/ssh-port-22.md)
- [Telnet - Port 23](https://www.verylazytech.com/network-pentesting/telnet-port-23.md)
- [SMTP/s - Port 25,465,587](https://www.verylazytech.com/network-pentesting/smtp-s-port-25-465-587.md)
- [WHOIS - Port 43](https://www.verylazytech.com/network-pentesting/whois-port-43.md)
- [TACACS+ - Port 49](https://www.verylazytech.com/network-pentesting/tacacs+-port-49.md)
- [DNS - Port 53](https://www.verylazytech.com/network-pentesting/dns-port-53.md)
- [TFTP/Bittorrent-tracker - Port 69/UDP](https://www.verylazytech.com/network-pentesting/tftp-bittorrent-tracker-port-69-udp.md)
- [Finger - Port 79](https://www.verylazytech.com/network-pentesting/finger-port-79.md)
- [Web - Port 80,443](https://www.verylazytech.com/network-pentesting/web-port-80-443.md): Ports 80 and 443 are the primary ports for web traffic, with port 80 handling unencrypted HTTP traffic and port 443 managing encrypted HTTPS traffic.
- [Kerberos - Port 88](https://www.verylazytech.com/network-pentesting/kerberos-port-88.md): Master pentesting Kerberos on port 88 with VeryLazyTech’s lazy methodology—exploits included!
- [POP - Port 110/995](https://www.verylazytech.com/network-pentesting/pop-port-110-995.md)
- [Portmapper - Port 111/TCP/UDP](https://www.verylazytech.com/network-pentesting/portmapper-port-111-tcp-udp.md)
- [Ident - Port 113](https://www.verylazytech.com/network-pentesting/ident-port-113.md)
- [NTP - Port 123/UDP](https://www.verylazytech.com/network-pentesting/ntp-port-123-udp.md)
- [MSRPC - Port 135, 539](https://www.verylazytech.com/network-pentesting/msrpc-port-135-539.md)
- [NetBios - Port 137,138,139](https://www.verylazytech.com/network-pentesting/netbios-port-137-138-139.md)
- [SMB - Port 139 445](https://www.verylazytech.com/network-pentesting/smb-port-139-445.md)
- [IMAP - Port 143, 993](https://www.verylazytech.com/network-pentesting/imap-port-143-993.md)
- [SNMP - Ports  161, 162, 10161, and 10162/UDP](https://www.verylazytech.com/network-pentesting/snmp-ports-161-162-10161-and-10162-udp.md)
- [IRC - Ports 194,6667,6660-7000](https://www.verylazytech.com/network-pentesting/irc-ports-194-6667-6660-7000.md): IRC, initially a plain text protocol, was assigned 194/TCP by IANA but is commonly run on 6667/TCP and similar ports to avoid needing root privileges for operation.
- [Check Point Firewall - Port 264](https://www.verylazytech.com/network-pentesting/check-point-firewall-port-264.md)
- [LDAP - Ports 389, 636, 3268, 3269](https://www.verylazytech.com/network-pentesting/ldap-ports-389-636-3268-3269.md)
- [IPsec/IKE VPN - Port 500/UDP](https://www.verylazytech.com/network-pentesting/ipsec-ike-vpn-port-500-udp.md)
- [Modbus - Port 502](https://www.verylazytech.com/network-pentesting/modbus-port-502.md): Modbus is a communication protocol used in industrial automation to allow devices like programmable logic controllers (PLCs) to talk to each other.
- [Rexec - Port 512](https://www.verylazytech.com/network-pentesting/rexec-port-512.md): It is a service that allows you to execute a command inside a host if you know valid credentials (username and password).
- [Rlogin - Port 513](https://www.verylazytech.com/network-pentesting/rlogin-port-513.md)
- [Rsh - Port 514](https://www.verylazytech.com/network-pentesting/rsh-port-514.md)
- [Line Printer Daemon (LPD) - Port 515](https://www.verylazytech.com/network-pentesting/line-printer-daemon-lpd-port-515.md)
- [Apple Filing Protocol (AFP) - PORT 548](https://www.verylazytech.com/network-pentesting/apple-filing-protocol-afp-port-548.md)
- [RTSP - Port 554, 8554](https://www.verylazytech.com/network-pentesting/rtsp-port-554-8554.md)
- [IPMI - Port 623/UDP/TCP](https://www.verylazytech.com/network-pentesting/ipmi-port-623-udp-tcp.md)
- [Internet Printing Protocol (IPP) - Port 631](https://www.verylazytech.com/network-pentesting/internet-printing-protocol-ipp-port-631.md)
- [EPP - Port 700](https://www.verylazytech.com/network-pentesting/epp-port-700.md)
- [Rsync - Port 873](https://www.verylazytech.com/network-pentesting/rsync-port-873.md)
- [Rusersd Service - Port 1026](https://www.verylazytech.com/network-pentesting/rusersd-service-port-1026.md)
- [Socks - Port 1080](https://www.verylazytech.com/network-pentesting/socks-port-1080.md)
- [Java RMI - RMI-IIOP - Port 1098/1099/1050](https://www.verylazytech.com/network-pentesting/java-rmi-rmi-iiop-port-1098-1099-1050.md)
- [MSSQL  (Microsoft SQL Server) - Port 1433](https://www.verylazytech.com/network-pentesting/mssql-microsoft-sql-server-port-1433.md): Master pentesting MSSQL on port 1433 with VeryLazyTech’s guide—exploits, tips, and more!
- [Oracle TNS Listener - Port 1521,1522-1529](https://www.verylazytech.com/network-pentesting/oracle-tns-listener-port-1521-1522-1529.md)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://www.verylazytech.com/network-pentesting.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
