Post

Important Ports

Top 25 Ports Important to Cybersecurity

Port NumberProtocolDescriptionCommon UsePotential Cyber AttacksExamples of Attacks
πŸ—‚οΈ 20TCPFTP Data TransferFile Transfer ProtocolFTP Spoofing, Packet SniffingMan-in-the-middle attacks during FTP transfers
πŸ“‘ 21TCPFTP ControlFile Transfer ProtocolFTP Brute Force, Credential TheftAttacks using stolen FTP credentials
πŸ”’ 22TCPSSHSecure Shell for remote loginSSH Brute Force, Unauthorized AccessBrute force attacks to gain shell access
πŸ“ž 23TCPTelnetRemote login protocolTelnet Sniffing, Credential TheftEavesdropping on unencrypted Telnet sessions
βœ‰οΈ 25TCPSMTPSimple Mail Transfer ProtocolSpam, Mail Relay AttacksSending of spam emails using open relays
🌐 53UDP/TCPDNSDomain Name SystemDNS Spoofing, DNS Amplification AttacksAttacks that redirect users to malicious sites
✨ 67UDPDHCPDynamic Host Configuration ProtocolDHCP Spoofing, Rogue DHCP ServersAssigning unauthorized IP addresses
🌍 80TCPHTTPHyperText Transfer ProtocolSQL Injection, Cross-Site Scripting (XSS)Exploiting vulnerabilities in web applications
πŸ“₯ 110TCPPOP3Post Office ProtocolCredential Theft, EavesdroppingAttacks targeting users’ email credentials
πŸ—„οΈ 139TCPSMBServer Message BlockSMB Relay Attacks, Unauthorized File AccessAccessing shared files without permission
πŸ“© 143TCPIMAPInternet Message Access ProtocolPhishing, Credential TheftUnauthorized access via stolen email credentials
πŸ“‘ 161UDPSNMPSimple Network Management ProtocolSNMP Spoofing, Denial of ServiceOverloading SNMP management systems
πŸ“¬ 162UDPSNMP TrapSNMP Trap messagesSNMP Amplification AttacksAmplifying traffic to overwhelm systems
πŸ” 443TCPHTTPSSecure HTTP ProtocolSSL Stripping, Man-in-the-Middle (MitM) AttacksIntercepting encrypted communications
πŸ“‚ 445TCPSMB over TCPServer Message Block over TCPRansomware Attacks, Unauthorized AccessNote-worthy attacks include WannaCry
πŸ”’ 465TCPSMTPSSecure SMTPCredential Theft, EavesdroppingExploiting SSL vulnerabilities in email protocols
πŸ“œ 514UDPSyslogSystem loggingSyslog Spoofing, Log InjectionSending false logs to mislead administrators
βœ‰οΈ 587TCPSMTP (Secure)SMTP secure submissionSpam, Mail Relay AttacksCompromised email accounts used for spam
πŸ–¨οΈ 631TCPIPPInternet Printing ProtocolIPP Exploits, Denial of ServiceTargeted attacks on networked printers
πŸ” 993TCPIMAPSSecure IMAPPhishing, Credential TheftUnauthorized access via stolen email credentials
πŸ” 995TCPPOP3SSecure POP3Credential Theft, EavesdroppingAttacks targeting users’ email credentials
🌐 8080TCPHTTP AlternativeAlternative HTTP portWeb Application Attacks, DDoSTesting vulnerabilities in alternative web ports
🌍 8443TCPHTTPS AlternativeAlternative HTTPSSSL Stripping, Man-in-the-Middle (MitM) AttacksIntercepting encrypted communications
πŸ—ƒοΈ 3306TCPMySQLMySQL Database SystemDatabase Attacks, Unauthorized AccessSQL injection attacks on MySQL databases
πŸ“ˆ 5432TCPPostgreSQLPostgreSQL Database SystemDatabase Attacks, Unauthorized AccessSQL injection attacks on PostgreSQL databases
πŸ–₯️ 5900TCPVNCVirtual Network ComputingRemote Control Attacks, Credential TheftGaining unauthorized remote access
πŸ—‚οΈ 6379TCPRedisRedis DatabaseData Theft, Denial of ServiceAttacks exploiting unsecured Redis instances
This post is licensed under CC BY 4.0 by the author.