Ports and associated Vectors

Port
Use case
Abuse Case

21

21 FTP (File Transfer Protocol)

Exploited for brute force attacks to gain unauthorized access to file shares and potentially upload malicious scripts or files.

22

SSH (Secure Shell)

Targeted for brute force or dictionary attacks to gain remote control of systems. Often scanned for vulnerable or default credentials.

23

Telnet

Because it's unencrypted, attackers could eavesdrop on communications, capturing credentials for unauthorized access.

25

SMTP (Simple Mail Transfer Protocol)

Used for sending spam or phishing emails if the SMTP server is compromised or misconfigured.

53

DNS (Domain Name System)

Exploited in DNS amplification attacks to overwhelm a network with DNS response traffic, leading to DDoS attacks.

80/443

HTTP/HTTPS (Web Services)

Web servers on these ports can be targeted with various web application attacks such as SQL injection, XSS, or CSRF.

110/995

POP3/POP3S (Email Retrieval)

Attackers could intercept unencrypted POP3 traffic to steal email credentials or use compromised accounts to spread malware.

135-139/445

Windows RPC/NetBIOS/SMB

Exploited by malware like WannaCry for spreading within networks or to execute remote code.

143/993

IMAP/IMAPS (Email Retrieval)

Similar to POP3, IMAP traffic can be intercepted to gain unauthorized access to email accounts.

161/162

SNMP (Simple Network Management Protocol)

Misused to gather detailed network information or, in some configurations, to modify device settings.

389/636

LDAP/LDAPS (Directory Services)

Attackers could exploit vulnerabilities to perform directory traversal attacks or gain unauthorized access to directory listings.

1433/1434

Microsoft SQL Server

SQL injection attacks or unauthorized access for data theft or manipulation. Exploited for executing remote commands.

1521

Oracle Database

Attackers may attempt to exploit vulnerabilities for unauthorized database access or to inject malicious SQL queries.

1812/1813

RADIUS (Remote Authentication Dial-In User Service)

Used for network authentication. Vulnerable to brute force attacks or exploited for unauthorized network access if poorly configured.

3306

MySQL

If accessible from externally, it can be brute-forced or exploited to gain access to databases, leading to data theft or loss.

3389

RDP (Remote Desktop Protocol)

Often targeted for brute force attacks or BlueKeeplike vulnerabilities to gain remote control of systems.

3899

Radmin (Remote Administrator)

A remote control software that can be abused for unauthorized remote access if left exposed or if weak credentials are used.

4444

Metasploit Framework’s default port for payloads

Often used by attackers after exploiting a vulnerability to establish a reverse shell or gain control over a system.

4848

GlassFish Server Administration Console

Can be targeted for unauthorized access or remote code execution if not secured with strong authentication.

5000

UPnP (Universal Plug and Play)

Can be exploited to open other ports or for denialof-service attacks due to its capability to configure network devices.

5060/5061

SIP (Session Initiation Protocol)

Utilized in VoIP environments, vulnerable to eavesdropping, toll fraud, or DDoS attacks targeting communication infrastructure.

5555

Android Debug Bridge

If left open, can be exploited to install malicious applications, exfiltrate data, or control the device remotely without user consent.

5601

Kibana

Exposed instances without proper authentication can lead to unauthorized access to data indexed by Elasticsearch.

5900/5901

VNC (Virtual Network Computing)

Vulnerable to brute force attacks or unauthorized access if not properly secured with strong passwords and encryption.

5985/5986

WinRM (Windows Remote Management)

If improperly configured, can be exploited for remote code execution or lateral movement within a network.

6379

Redis

Unsecured instances may lead to data theft, ransomware, or unauthorized use of the server for malicious purposes.

6667

IRC (Internet Relay Chat)

Historically used by botnets as command and control channels. Vulnerable to eavesdropping and man-in-the-middle attacks if not encrypted.

7547

CWMP (TR-069) - CPE WAN Management Protocol

Exploited in mass-scale attacks to remotely manage home routers and modems. Vulnerabilities can lead to device compromise.

8000/8001

Common alternative HTTP ports

Often used for web servers running in non-standard configurations, which may be less monitored and therefore vulnerable to web application attacks

8080/8443

Alternate HTTP/HTTPS

Often used for web applications and services, which could be targeted with various web-based exploits if not secured.

8081

Proxy or web server alternative port

Similar to port 8080, but less commonly monitored, making services hosted here potential targets for unnoticed exploitation.

8089

Splunkd

Exposed management ports can lead to unauthorized access to Splunk datasets or system compromise.

8291

MikroTik RouterOS Winbox

Vulnerabilities could allow attackers to bypass authentication and gain remote access to the device.

8444

Bitmessage

A decentralized messaging protocol that can be abused for exfiltrating data or command and control if not properly secured.

9001/9030

Tor network entry/exit nodes

Used by Tor for anonymous communication. Misconfigured Tor services can be exploited for malicious purposes or data exfiltration.

9100

PDL (Printer Description Language) Data Stream

Vulnerable to printing denial of service or unauthorized document printing if exposed to a public network.

9200/9300

Elasticsearch

Open ports can be misused for unauthorized data access, deletion, or index manipulation if not properly secured.

10000

Webmin

A web-based interface for system administration for Unix. Vulnerable to exploitation if not regularly updated or properly secured

10050/10051

Zabbix Agent/Server

Open Zabbix agents or servers could be compromised to gain information on monitored systems or to execute commands.

11211

Memcached

Exploited in reflection DDoS attacks due to its high bandwidth amplification factor when left exposed to the internet.

27015

Valve's Source Dedicated Server

Could be targeted for DDoS attacks, disrupting game servers and other services running on this port.

27017-27019

MongoDB

Exposed databases can be targeted for unauthorized access, data leakage, or ransomware attacks due to misconfiguration or lack of authentication.

27018

MongoDB default port for Sharded clusters

Similar risks as the default MongoDB port (27017), but specific to Sharded clusters. Misconfiguration can lead to unauthorized data access.

32400

Plex Media Server

If improperly secured, can be accessed without authorization, potentially exposing personal media collections or being used for bandwidth theft.

Last updated