Top 50 Ports & Vulnerability

6 months ago 30
BOOK THIS SPACE FOR AD
ARTICLE AD

LogicTech

Source By: Top 50 Ports & Vulnerability

ports represent common entry points and services used across the internet.

The vulnerabilities associated with these ports can stem from outdated software, poor configurations, weak passwords, and unencrypted communications, data lick, Weak passwords, brute force attacks, making them susceptible to various cyber-attacks.

Port 5432 (PostgreSQL) — PostgreSQL Database

Vulnerabilities: SQL injection, weak authentication, outdated versions.

Port 5900 (VNC) — Virtual Network Computing

Vulnerabilities: Weak passwords, brute force attacks, plaintext transmission.

Port 5984 (CouchDB) — CouchDB Database

Vulnerabilities: Weak authentication, and unauthorized access.

Port 6379 (Redis) — Redis Database

Vulnerabilities: No authentication by default, data leakage.

Port 6660–6669 (IRC) — Internet Relay Chat

Vulnerabilities: DDoS attacks, unencrypted communication.

Port 8000 (HTTP Alt) — Alternative HTTP

Vulnerabilities: Various web vulnerabilities, misconfigurations.

Port 8080 (HTTP Alt) — Alternative HTTP

Vulnerabilities: Various web vulnerabilities, and misconfigurations.
Top 50 Ports

Port 8443 (HTTPS Alt) — Alternative HTTPS

Vulnerabilities: SSL/TLS vulnerabilities, misconfigurations.

Port 8888 (HTTP Alt) — Alternative HTTP

Vulnerabilities: Various web vulnerabilities, and misconfigurations.

Port 9000 (Hadoop) — Hadoop

Vulnerabilities: Unauthorized access, weak authentication.

Port 9092 (Kafka) — Apache Kafka

Vulnerabilities: Weak authentication, and data leakage.

Port 9200 (Elasticsearch) — Elasticsearch

Vulnerabilities: Unauthorized access, and data leakage.

Port 9300 (Elasticsearch) — Elasticsearch Transport

Vulnerabilities: Unauthorized access, and data leakage.

Port 11211 (Memcached) — Memcached

Vulnerabilities: Amplification attacks, and unauthorized access.
Vulnerability

Port 27017 (MongoDB) — MongoDB

Vulnerabilities: Unauthorized access, and data leakage.

Port 50000 (DB2) — IBM DB2

Vulnerabilities: SQL injection, weak authentication.

Port 50070 (Hadoop NameNode) — Hadoop NameNode

Vulnerabilities: Unauthorized access, and data leakage.

Port 50075 (Hadoop DataNode) — Hadoop DataNode

Vulnerabilities: Unauthorized access, and data leakage.

Port 61616 (ActiveMQ) — Apache ActiveMQ

Vulnerabilities: Unauthorized access, and data leakage.

Port 27018 (MongoDB) — MongoDB

Vulnerabilities: Unauthorized access, and data leakage.

Port 27019 (MongoDB) — MongoDB

Vulnerabilities: Unauthorized access, and data leakage.

Port 20/21 (FTP) — File Transfer Protocol

Vulnerabilities: Plaintext transmission, weak authentication, potential for brute force attacks.

Port 22 (SSH) — Secure Shell

Vulnerabilities: Brute force attacks, outdated versions, weak passwords.

Port 23 (Telnet) — Telnet

Vulnerabilities: Plaintext transmission, easily sniffable, deprecated in favor of SSH.

Port 25 (SMTP) — Simple Mail Transfer Protocol

Vulnerabilities: Email spoofing, spam relay, open relay exploits.
All post connect

Port 53 (DNS) — Domain Name System

Vulnerabilities: DNS poisoning, amplification attacks, cache poisoning.

Port 67/68 (DHCP) — Dynamic Host Configuration Protocol

Vulnerabilities: DHCP spoofing, denial of service.

Port 80 (HTTP) — HyperText Transfer Protocol

Vulnerabilities: Plaintext transmission, and various web application vulnerabilities (e.g., XSS, SQL injection).

Port 110 (POP3) — Post Office Protocol v3

Vulnerabilities: Plaintext authentication, man-in-the-middle attacks.

Port 119 (NNTP) — Network News Transfer Protocol

Vulnerabilities: Outdated protocol, not commonly used, potential for abuse.

Port 123 (NTP) — Network Time Protocol

Vulnerabilities: NTP amplification attacks, outdated versions.

Port 137–139 (NetBIOS) — Network Basic Input/Output System

Vulnerabilities: Information leakage, SMB vulnerabilities, DoS attacks.

Port 143 (IMAP) — Internet Message Access Protocol

Vulnerabilities: Plaintext transmission, outdated versions, potential for unauthorized access.

Port 161/162 (SNMP) — Simple Network Management Protocol

Vulnerabilities: Plaintext community strings, default passwords, version 1 vulnerabilities.

Port 389 (LDAP) — Lightweight Directory Access Protocol

Vulnerabilities: Injection attacks, and weak access controls.

Port 443 (HTTPS) — HyperText Transfer Protocol Secure

Vulnerabilities: SSL/TLS vulnerabilities (e.g., Heartbleed, POODLE), misconfigurations.

Port 445 (SMB) — Server Message Block

Vulnerabilities: WannaCry ransomware, SMB relay attacks, EternalBlue exploit.

Port 465 (SMTPS) — Secure SMTP

Vulnerabilities: This was initially assigned to SMTPS but is now deprecated in favor of ports 587 and 25 with STARTTLS.

Port 514 (Syslog) — System Logging Protocol

Vulnerabilities: Plaintext transmission, potential information leakage.

Port 587 (SMTP) — Mail Submission

Vulnerabilities: Authentication attacks, misconfigurations.

Port 631 (IPP) — Internet Printing Protocol

Vulnerabilities: potential remote code execution vulnerabilities in older implementations.

Port 636 (LDAPS) — Secure LDAP

Vulnerabilities: SSL/TLS vulnerabilities, misconfigurations.

Port 993 (IMAPS) — Secure IMAP

Vulnerabilities: SSL/TLS vulnerabilities, outdated implementations.

Port 995 (POP3S) — Secure POP3

Vulnerabilities: SSL/TLS vulnerabilities, outdated implementations.Port 1433/1434 (MSSQL) — Microsoft SQL ServerVulnerabilities: SQL injection, weak authentication, outdated versions.

Port 1521 (Oracle) — Oracle Database

Vulnerabilities: SQL injection, default passwords, outdated versions.

Port 2049 (NFS) — Network File System

Vulnerabilities: Information leakage, and unauthorized access.

Port 3306 (MySQL) — MySQL Database

Vulnerabilities: SQL injection, weak passwords, outdated versions.

Port 3389 (RDP) — Remote Desktop Protocol

Vulnerabilities: Brute force attacks, RDP hijacking, BlueKeep vulnerability.

Port 3690 (SVN) — Subversion

Vulnerabilities: Authentication bypass, outdated versions.
Read Entire Article