Understanding iOS is a fun game!

General Network security, firewalls, port filtering/forwarding, wireless security, anti-spyware, as well as spam control and privacy discussions.
Post Reply
KadSpeedo
New Member
Posts: 1
Joined: Tue Jan 16, 2024 1:55 am

Understanding iOS is a fun game!

Post by KadSpeedo »

Hi All,

So I have been digging into Safari and iOS 26 the last few weeks, trying to actually figure out how things actually function. Combining the available tools on iPhone is much more frustrating than it was on Android and much different.

So I ran some tests in my browser today, and am now even more perplexed. The port check here says the below. What should I do next to keep investigating this? Is the terminal on iOS a good place to do some probing? I’m a total newb to such things but am consistently attempting to insert myself into this world, so give me some love y’all!
Speedguide port scan:
52 filtered tcp ports (no-response)
28 open|filtered udp ports (no-response)
5678/udp closed rrac - it’s not listed on the description here, but I could swear STUN uses this port, router vulns
27374/udp closed unknown - Address Search Protocol Daemon (ASPD) / Trojans win32
28960/udp closed unknown - I swear every device I’ve run here has one of these Wolfenstein ports closed. Is this not a known vector for attack? It seems to frequent to be normal on my devices. I don’t play multiplayer FPS games etc.

When I ran a port scan on Shields Up, it said I was in uber stealth and had no resonses to any port probes. I am not sure if some of the online tools I’ve used today are still relevant. Shields up is ancient, as is nmap.org etc. Am I missing some core nerd secret here that will make me a laughing stock? :rotfl: :confused:

What are your go-to tools for on device dabbling with iPhones?
User avatar
Philip
SG VIP
Posts: 11726
Joined: Sat May 08, 1999 5:00 am
Location: Jacksonville, Florida

Re: Understanding iOS is a fun game!

Post by Philip »

You are not missing anything, the details on what we know about those ports are listed in the online ports database.

The important thing is you have no open ports, no running servers you don't know about.
Seems like most of your ports are filtered (no response from your end to the test server), that's a good thing.
"Closed" ports still don't allow traffic, it is just that your end responded with info that the ports are closed. The only implication of this is that it may be used for fingerprinting, finding the type of device you're running by the closed ports numbers, but I wouldn't worry about it.

No idea on traffic sniffing with an iPhone specifically, you would usually have to do some type of WiFi sniffing (like setup a WiFi device like an AP and route all your iPhone traffic through it, then use Wireshark, etc. to capture packets). I don't think it is necessary in your case, no suspicious open ports.
Post Reply