Member-only story

Port Scanning for Bug Bounties

Vijay Kumar Gupta
6 min readSep 1, 2024

--

1. Introduction

Port scanning is one of the most fundamental techniques used in bug bounty hunting and penetration testing. It involves probing a target system to identify open ports, which can then be analyzed for vulnerabilities. Understanding how to perform effective port scans is crucial for any aspiring bug bounty hunter.

In this guide, we’ll delve into the various methods of port scanning, the tools you can use, and how to interpret the results to find potential security weaknesses.

2. Understanding Port Scanning

Port scanning is the process of sending packets to specific ports on a networked device to determine which ports are open, closed, or filtered. Each port on a system corresponds to a particular service, and identifying which ports are open can reveal valuable information about the target’s attack surface.

Ports are categorized as:

  • Well-Known Ports (0–1023): Common services like HTTP (80), HTTPS (443), FTP (21), etc.
  • Registered Ports (1024–49151): Services registered with IANA, like MySQL (3306), etc.
  • Dynamic or Private Ports (49152–65535): Typically used for client-side communication.

--

--

Vijay Kumar Gupta
Vijay Kumar Gupta

Written by Vijay Kumar Gupta

Vijay Gupta is an inspiring public speaker and social entrepreneur who has dedicated his life to bringing about positive change and empowering communities.

No responses yet