More ports? More ports!
Monitoring tools
It's "Just" Acronyms...
"Let me check my logs real quick"
Are you threat typing me?
100

Kerberos

what is port 88

100

This network tool can sit at a network boundary and allow or block network traffic via various rulesets.

Firewall

100

SOC

What is Security Operation Center?

100

"SRC" on a iptables log indicates this bit of information. 

What is Source?

100

This type of cyber threat takes advantage of a previously unknown security flaw in software, hardware or firmware which the developers had no clue that existed and have no patch for.

What is a zero-day?

200

445

what is Port SMB

200

A set of rules that dictates who can access a specific digital resource  and what actions they can perform  

What is Access control list.

200

DNS

what is Domain Name Service?
200

This acronym represents the Destination port within the IPtables log format.

What is DPT?

200

This type of cyber threat is a cyberattack that overwhelms a target server, website, or network with massive amounts of malicious internet traffic from many compromised devices to make it unavailable for legitimate users, causing service disruptions and outages. 

What is DDoS?

300

port 110

what is POP3

300

Provides signature-based detection via log and file system monitoring via and endpoint agents installed on devices.

What is HIDS?

300

SIEM

what is Security Information and Event management?

300

A device makes this type of request whenever it is trying to receive a resource for a remote web server. Be it page, or file.

what is "GET"?

300

This type of threat refers to a type of sophisticated and prolonged cyberattack in which an unauthorized actor gains access to a network and remains undetected for an extended period to steal sensitive data, conduct espionage, or sabotage systems.

What is APT?

400

L2TP

what is port 1701

400

A high-security identification method that scans and maps the unique, complex pattern of blood vessels at the back of your eye using a low-energy infrared light, converting this pattern into a digital code for authentication verification.

What is a Biometric retinal scan?

Or

What is retinal scan?

400

EUBA

What is End user Behavior Analytics?
400

this attack exploits web application flaws to access files and directories outside the intended web root, letting attackers read sensitive data, view source code, or even take control of the server by manipulating file paths with sequences like ../../../

What is a directory traversal attack?

400

This type of threat involves the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers. 

What is phishing?

500

SFTP

what is port 22

500

A biometric technology that identifies or verifies a person based on their unique walking style, analyzing body shape, movement, and patterns like step length, speed, and stride, often using machine learning from video footage.

What is gait detection?

500

Iaas

what is Infrastructure as a Service.

500

A web server may respond with this HTTP response code if the server can not process the request due to server error or misconfiguration.

what is 500?

5xx

500

this type of threat actor can be a person who gains unauthorized access to computer files or networks in order to further social or political ends.

What is a hacktivist?

M
e
n
u