# Ports and associated Vectors

<table><thead><tr><th width="151">Port</th><th width="239">Use case</th><th>Abuse Case</th></tr></thead><tbody><tr><td>21</td><td>21 FTP (File Transfer Protocol)</td><td>Exploited for brute force attacks to gain unauthorized access to file shares and potentially upload malicious scripts or files.</td></tr><tr><td>22</td><td>SSH (Secure Shell)</td><td>Targeted for brute force or dictionary attacks to gain remote control of systems. Often scanned for vulnerable or default credentials.</td></tr><tr><td>23</td><td>Telnet</td><td>Because it's unencrypted, attackers could eavesdrop on communications, capturing credentials for unauthorized access.</td></tr><tr><td>25</td><td>SMTP (Simple Mail Transfer Protocol)</td><td>Used for sending spam or phishing emails if the SMTP server is compromised or misconfigured.</td></tr><tr><td>53</td><td>DNS (Domain Name System)</td><td>Exploited in DNS amplification attacks to overwhelm a network with DNS response traffic, leading to DDoS attacks.</td></tr><tr><td>80/443</td><td>HTTP/HTTPS (Web Services)</td><td>Web servers on these ports can be targeted with various web application attacks such as SQL injection, XSS, or CSRF.</td></tr><tr><td>110/995</td><td>POP3/POP3S (Email Retrieval)</td><td>Attackers could intercept unencrypted POP3 traffic to steal email credentials or use compromised accounts to spread malware.</td></tr><tr><td>135-139/445</td><td>Windows RPC/NetBIOS/SMB</td><td>Exploited by malware like WannaCry for spreading within networks or to execute remote code.</td></tr><tr><td>143/993</td><td>IMAP/IMAPS (Email Retrieval)</td><td>Similar to POP3, IMAP traffic can be intercepted to gain unauthorized access to email accounts.</td></tr><tr><td>161/162</td><td>SNMP (Simple Network Management Protocol)</td><td>Misused to gather detailed network information or, in some configurations, to modify device settings.</td></tr><tr><td>389/636</td><td>LDAP/LDAPS (Directory Services)</td><td>Attackers could exploit vulnerabilities to perform directory traversal attacks or gain unauthorized access to directory listings.</td></tr><tr><td>1433/1434</td><td>Microsoft SQL Server</td><td>SQL injection attacks or unauthorized access for data theft or manipulation. Exploited for executing remote commands.</td></tr><tr><td>1521</td><td>Oracle Database</td><td>Attackers may attempt to exploit vulnerabilities for unauthorized database access or to inject malicious SQL queries.</td></tr><tr><td>1812/1813</td><td>RADIUS (Remote Authentication Dial-In User Service)</td><td>Used for network authentication. Vulnerable to brute force attacks or exploited for unauthorized network access if poorly configured.</td></tr><tr><td>3306</td><td>MySQL</td><td>If accessible from externally, it can be brute-forced or exploited to gain access to databases, leading to data theft or loss.</td></tr><tr><td>3389</td><td>RDP (Remote Desktop Protocol)</td><td>Often targeted for brute force attacks or BlueKeeplike vulnerabilities to gain remote control of systems.</td></tr><tr><td>3899</td><td>Radmin (Remote Administrator)</td><td>A remote control software that can be abused for unauthorized remote access if left exposed or if weak credentials are used.</td></tr><tr><td>4444</td><td>Metasploit Framework’s default port for payloads</td><td>Often used by attackers after exploiting a vulnerability to establish a reverse shell or gain control over a system.</td></tr><tr><td>4848</td><td>GlassFish Server Administration Console</td><td>Can be targeted for unauthorized access or remote code execution if not secured with strong authentication.</td></tr><tr><td>5000</td><td>UPnP (Universal Plug and Play)</td><td>Can be exploited to open other ports or for denialof-service attacks due to its capability to configure network devices.</td></tr><tr><td>5060/5061</td><td>SIP (Session Initiation Protocol)</td><td>Utilized in VoIP environments, vulnerable to eavesdropping, toll fraud, or DDoS attacks targeting communication infrastructure.</td></tr><tr><td>5555</td><td>Android Debug Bridge</td><td>If left open, can be exploited to install malicious applications, exfiltrate data, or control the device remotely without user consent.</td></tr><tr><td>5601</td><td>Kibana</td><td>Exposed instances without proper authentication can lead to unauthorized access to data indexed by Elasticsearch.</td></tr><tr><td>5900/5901</td><td>VNC (Virtual Network Computing)</td><td>Vulnerable to brute force attacks or unauthorized access if not properly secured with strong passwords and encryption.</td></tr><tr><td>5985/5986</td><td>WinRM (Windows Remote Management)</td><td>If improperly configured, can be exploited for remote code execution or lateral movement within a network.</td></tr><tr><td>6379</td><td>Redis</td><td>Unsecured instances may lead to data theft, ransomware, or unauthorized use of the server for malicious purposes.</td></tr><tr><td>6667</td><td>IRC (Internet Relay Chat)</td><td>Historically used by botnets as command and control channels. Vulnerable to eavesdropping and man-in-the-middle attacks if not encrypted.</td></tr><tr><td>7547</td><td>CWMP (TR-069) - CPE WAN Management Protocol</td><td>Exploited in mass-scale attacks to remotely manage home routers and modems. Vulnerabilities can lead to device compromise.</td></tr><tr><td>8000/8001</td><td>Common alternative HTTP ports</td><td>Often used for web servers running in non-standard configurations, which may be less monitored and therefore vulnerable to web application attacks</td></tr><tr><td>8080/8443</td><td>Alternate HTTP/HTTPS</td><td>Often used for web applications and services, which could be targeted with various web-based exploits if not secured.</td></tr><tr><td>8081</td><td>Proxy or web server alternative port</td><td>Similar to port 8080, but less commonly monitored, making services hosted here potential targets for unnoticed exploitation.</td></tr><tr><td>8089</td><td>Splunkd</td><td>Exposed management ports can lead to unauthorized access to Splunk datasets or system compromise.</td></tr><tr><td>8291</td><td>MikroTik RouterOS Winbox</td><td>Vulnerabilities could allow attackers to bypass authentication and gain remote access to the device.</td></tr><tr><td>8444</td><td>Bitmessage</td><td>A decentralized messaging protocol that can be abused for exfiltrating data or command and control if not properly secured.</td></tr><tr><td>9001/9030</td><td>Tor network entry/exit nodes</td><td>Used by Tor for anonymous communication. Misconfigured Tor services can be exploited for malicious purposes or data exfiltration.</td></tr><tr><td>9100</td><td>PDL (Printer Description Language) Data Stream</td><td>Vulnerable to printing denial of service or unauthorized document printing if exposed to a public network.</td></tr><tr><td>9200/9300</td><td>Elasticsearch</td><td>Open ports can be misused for unauthorized data access, deletion, or index manipulation if not properly secured.</td></tr><tr><td>10000</td><td>Webmin</td><td>A web-based interface for system administration for Unix. Vulnerable to exploitation if not regularly updated or properly secured</td></tr><tr><td>10050/10051</td><td>Zabbix Agent/Server</td><td>Open Zabbix agents or servers could be compromised to gain information on monitored systems or to execute commands.</td></tr><tr><td>11211</td><td>Memcached</td><td>Exploited in reflection DDoS attacks due to its high bandwidth amplification factor when left exposed to the internet.</td></tr><tr><td>27015</td><td>Valve's Source Dedicated Server</td><td>Could be targeted for DDoS attacks, disrupting game servers and other services running on this port.</td></tr><tr><td></td><td></td><td></td></tr><tr><td>27017-27019</td><td>MongoDB</td><td>Exposed databases can be targeted for unauthorized access, data leakage, or ransomware attacks due to misconfiguration or lack of authentication.</td></tr><tr><td>27018</td><td>MongoDB default port for Sharded clusters</td><td>Similar risks as the default MongoDB port (27017), but specific to Sharded clusters. Misconfiguration can lead to unauthorized data access.</td></tr><tr><td>32400</td><td>Plex Media Server</td><td>If improperly secured, can be accessed without authorization, potentially exposing personal media collections or being used for bandwidth theft.</td></tr></tbody></table>
