Ports and associated Vectors
21
21 FTP (File Transfer Protocol)
Exploited for brute force attacks to gain unauthorized access to file shares and potentially upload malicious scripts or files.
22
SSH (Secure Shell)
Targeted for brute force or dictionary attacks to gain remote control of systems. Often scanned for vulnerable or default credentials.
23
Telnet
Because it's unencrypted, attackers could eavesdrop on communications, capturing credentials for unauthorized access.
25
SMTP (Simple Mail Transfer Protocol)
Used for sending spam or phishing emails if the SMTP server is compromised or misconfigured.
53
DNS (Domain Name System)
Exploited in DNS amplification attacks to overwhelm a network with DNS response traffic, leading to DDoS attacks.
80/443
HTTP/HTTPS (Web Services)
Web servers on these ports can be targeted with various web application attacks such as SQL injection, XSS, or CSRF.
110/995
POP3/POP3S (Email Retrieval)
Attackers could intercept unencrypted POP3 traffic to steal email credentials or use compromised accounts to spread malware.
135-139/445
Windows RPC/NetBIOS/SMB
Exploited by malware like WannaCry for spreading within networks or to execute remote code.
143/993
IMAP/IMAPS (Email Retrieval)
Similar to POP3, IMAP traffic can be intercepted to gain unauthorized access to email accounts.
161/162
SNMP (Simple Network Management Protocol)
Misused to gather detailed network information or, in some configurations, to modify device settings.
389/636
LDAP/LDAPS (Directory Services)
Attackers could exploit vulnerabilities to perform directory traversal attacks or gain unauthorized access to directory listings.
1433/1434
Microsoft SQL Server
SQL injection attacks or unauthorized access for data theft or manipulation. Exploited for executing remote commands.
1521
Oracle Database
Attackers may attempt to exploit vulnerabilities for unauthorized database access or to inject malicious SQL queries.
1812/1813
RADIUS (Remote Authentication Dial-In User Service)
Used for network authentication. Vulnerable to brute force attacks or exploited for unauthorized network access if poorly configured.
3306
MySQL
If accessible from externally, it can be brute-forced or exploited to gain access to databases, leading to data theft or loss.
3389
RDP (Remote Desktop Protocol)
Often targeted for brute force attacks or BlueKeeplike vulnerabilities to gain remote control of systems.
3899
Radmin (Remote Administrator)
A remote control software that can be abused for unauthorized remote access if left exposed or if weak credentials are used.
4444
Metasploit Framework’s default port for payloads
Often used by attackers after exploiting a vulnerability to establish a reverse shell or gain control over a system.
4848
GlassFish Server Administration Console
Can be targeted for unauthorized access or remote code execution if not secured with strong authentication.
5000
UPnP (Universal Plug and Play)
Can be exploited to open other ports or for denialof-service attacks due to its capability to configure network devices.
5060/5061
SIP (Session Initiation Protocol)
Utilized in VoIP environments, vulnerable to eavesdropping, toll fraud, or DDoS attacks targeting communication infrastructure.
5555
Android Debug Bridge
If left open, can be exploited to install malicious applications, exfiltrate data, or control the device remotely without user consent.
5601
Kibana
Exposed instances without proper authentication can lead to unauthorized access to data indexed by Elasticsearch.
5900/5901
VNC (Virtual Network Computing)
Vulnerable to brute force attacks or unauthorized access if not properly secured with strong passwords and encryption.
5985/5986
WinRM (Windows Remote Management)
If improperly configured, can be exploited for remote code execution or lateral movement within a network.
6379
Redis
Unsecured instances may lead to data theft, ransomware, or unauthorized use of the server for malicious purposes.
6667
IRC (Internet Relay Chat)
Historically used by botnets as command and control channels. Vulnerable to eavesdropping and man-in-the-middle attacks if not encrypted.
7547
CWMP (TR-069) - CPE WAN Management Protocol
Exploited in mass-scale attacks to remotely manage home routers and modems. Vulnerabilities can lead to device compromise.
8000/8001
Common alternative HTTP ports
Often used for web servers running in non-standard configurations, which may be less monitored and therefore vulnerable to web application attacks
8080/8443
Alternate HTTP/HTTPS
Often used for web applications and services, which could be targeted with various web-based exploits if not secured.
8081
Proxy or web server alternative port
Similar to port 8080, but less commonly monitored, making services hosted here potential targets for unnoticed exploitation.
8089
Splunkd
Exposed management ports can lead to unauthorized access to Splunk datasets or system compromise.
8291
MikroTik RouterOS Winbox
Vulnerabilities could allow attackers to bypass authentication and gain remote access to the device.
8444
Bitmessage
A decentralized messaging protocol that can be abused for exfiltrating data or command and control if not properly secured.
9001/9030
Tor network entry/exit nodes
Used by Tor for anonymous communication. Misconfigured Tor services can be exploited for malicious purposes or data exfiltration.
9100
PDL (Printer Description Language) Data Stream
Vulnerable to printing denial of service or unauthorized document printing if exposed to a public network.
9200/9300
Elasticsearch
Open ports can be misused for unauthorized data access, deletion, or index manipulation if not properly secured.
10000
Webmin
A web-based interface for system administration for Unix. Vulnerable to exploitation if not regularly updated or properly secured
10050/10051
Zabbix Agent/Server
Open Zabbix agents or servers could be compromised to gain information on monitored systems or to execute commands.
11211
Memcached
Exploited in reflection DDoS attacks due to its high bandwidth amplification factor when left exposed to the internet.
27015
Valve's Source Dedicated Server
Could be targeted for DDoS attacks, disrupting game servers and other services running on this port.
27017-27019
MongoDB
Exposed databases can be targeted for unauthorized access, data leakage, or ransomware attacks due to misconfiguration or lack of authentication.
27018
MongoDB default port for Sharded clusters
Similar risks as the default MongoDB port (27017), but specific to Sharded clusters. Misconfiguration can lead to unauthorized data access.
32400
Plex Media Server
If improperly secured, can be accessed without authorization, potentially exposing personal media collections or being used for bandwidth theft.
Last updated