# En línea (online)

- [Hash](/explotacion/ataques-de-contrasenas/en-linea-online/hash.md)
- [21/TCP (FTP)](/explotacion/ataques-de-contrasenas/en-linea-online/21-tcp-ftp.md): FTP, File Transfer Protocol.
- [22/TCP (SSH)](/explotacion/ataques-de-contrasenas/en-linea-online/22-tcp-ssh.md): SSH, Secure SHell.
- [23/TCP (Telnet)](/explotacion/ataques-de-contrasenas/en-linea-online/23-tcp-telnet.md): Telnet, Teletype Network.
- [80/TCP, 443/TCP (HTTP/S)](/explotacion/ataques-de-contrasenas/en-linea-online/80-tcp-443-tcp-http-s.md): HTTP, Hypertext Transfer Protocol. HTTPS, Hypertext Transfer Protocol Secure.
- [161/UDP, 162/UDP (SNMP)](/explotacion/ataques-de-contrasenas/en-linea-online/161-udp-162-udp-snmp.md): SNMP, Simple Network Management Protocol.
- [445/TCP (SMB)](/explotacion/ataques-de-contrasenas/en-linea-online/445-tcp-smb.md): SMB, Server Message Block.
- [3306/TCP (MySQL)](/explotacion/ataques-de-contrasenas/en-linea-online/3306-tcp-mysql.md)
- [5432/TCP (PostgreSQL)](/explotacion/ataques-de-contrasenas/en-linea-online/5432-tcp-postgresql.md)
- [5985/TCP, 5986/TCP (WinRM)](/explotacion/ataques-de-contrasenas/en-linea-online/5985-tcp-5986-tcp-winrm.md): WinRM, Windows Remote Manager.
