Using one of these free scanning tools
Looking for a way to determine which ports are open and which ports are blocked on a computer? Ports are basically logical connections between two computers or network devices for sharing data. Port numbers range from 1 to 65536 and some port numbers are assigned to specific tasks, such as port 80 for transferring HTTP data.
Port 21 is for FTP, port 25 is for SMTP, port 110 is for POP3, port 23 is for Telnet, etc, etc. There are many ports that, if left open, can be considered a high security risk. Many viruses spread to different computers because of open ports, such as the Sasser virus, which used port 445 (Windows File Sharing) to infect thousands of machines. Read my previous article on how to prevent remote connections to your PC.
There are several ways to check for open ports, my favorite being using port scanner tools. They are free and you don’t have to install any software to scan for open ports. Also, you can scan any computer as long as you know the IP address. If you are a real geek or hardcore admin, you can use Netstat to check for open ports.
Port Scanning Tools
A really good port scanner is T1 Shopper, which lets you scan a single port, a range of ports, or the most common vulnerable ports like FTP, NetBIOS, etc.
By default, it puts in the IP address of your current Internet connection, so you can test your home or office router to see if which ports are listening. The web service will run through each port test and print out a line showing whether there was a response or not.
If you are looking for a way to test your web server or website to see which ports could be open, you can try out a cool tool from Pentest-Tools. Just type in the URL of the website you want to test and select whether you want to do a quick scan or full scan. The full scan requires registration, but it’s worth it if you want to make sure your web server is secure.
As you can see, this server has some major security vulnerabilities that are known to the general public, meaning hackers can exploit them easily.
Using both of these tools, you can quickly see if there are unnecessary services or outdated software running on your computer or server that could allow a hacker to gain unauthorized access. Enjoy!