
Ports are numbers that are used in TCP and UDP protocols for identification of applications. While some applications use well-known port numbers, such as 80 for HTTP, or 443 for HTTPS, some applications use dynamic ports. Open port refers to a port, on which a system is accepting communication.
Open port does not immediately mean a security issue. But, it can provide a pathway for attackers to the application listening on that port. Therefore, attackers can exploit shortcomings like weak credentials, no two-factor authentication, or even vulnerabilities in the application itself.
When open for the Internet, attackers can use open ports as an initial attack vector. Furthermore, listening ports on a local network can be used for lateral movement. It is a good practice to close ports or at least limit them to a local network. If necessary, you can make applications accessible to remote workers via a secure VPN.
Scanning tools used by both attackers and security professionals allow an automated detection of open ports. Many network-based IDS/IPS solutions, and even workstation-based endpoint security solutions can detect port scanning. It is worthwhile to investigate port scanning originating from inside the local network, as it often means a compromised device. However, computers running some security solutions can generate false positives. This is because vendors of security solutions feature a port scanner to detect vulnerable devices inside a home network.
Here are the below list of Infection vectors abusing the respective ports
Port | Infection Vectors |
22 | Shaft, SSH RAT |
23 | Tiny Telent Server |
25 | Antigen, Email Password Sender |
26 | Badpatch |
31/456 | Hackers Paradise |
53 | Denis Ebury |
68 | Mspy |
80 | Necurs, NetWire |
113 | Shiver |
139 | Nuker |
421 | TCP Wrappers Trojan |
443 | TrickBot,UBoatRAT,Carbanak |
445 | Wannacry |
456 | Hackers Paradise |
555 | Ini-Killer |
666 | Satanz Backdoor |
1001 | Silencer |
1011 | Doly Trojan |
1026/64666 | RSM |
1095-98 | RAT |
1170 | Psyber Stream Server |
1177 | njRAT |
1234 | Ultors Trojan |
1234/12345 | Valvoline |
1243 | Sub Seven 1.0-1.8 |
1243/6711/6776/27374 | Sub Seven |
1245 | VooDoo Doll |
1777 | Java RAT |
1349 | Back Office DLL |
1492 | FTP99CMP |
1433 | Misdat |
1600 | Shivka-Burka |
1604 | DarkComet AT |
1807 | SpySender |
1863 | XtremeRAT |
1981 | Shockrave |
1999 | BackDoor 1.00-1.03 |
2001 | Trojan Cow |
2115 | Bugs |
2140 | The Invasor |
2140/3150 | Deep Throat |
2155 | Illusion Mailer |
2801 | Phineas Phucker |
3129 | Masters Paradise |
3131 | Subsari |
3150 | The Invasor |
3389 | RDP |
3700/9872-9875/10067/10167 | Portal of Doom |
4000 | RA |
4567 | File Nail 1 |
4590 | ICQTrojan |
5000 | Bubbel |
6267 | GW Giri |
6400 | Thing |
6666 | KillRat |
6667/12349 | Bionet MagicHound |
6670-71 | DeepThroat |
6969 | GateCrasher, Priority |
7000 | Remote Grab |
7300-08 | NetMonitor |
7300/31338/31339 | Net Spy |
7597 | Qaz |
7626 | Gdoor |
7777 | GodMsg |
7789 | ICKiller |
8000 | BADCALL,Comnie |
8012 | Ptakks |
8080 | Zeus, APT 37, FIN 7 |
8443 | FelixRoot,Nidiran |
8787/54321 | BackOfrice |
9989 | Ini-Killer |
10048 | Delf |
10100 | Gift |
10607 | Coma |
11000 | Senna Spy |
11223 | Progenic Trojan |
12223 | Hack’99 Key Logger |
12345-46 | GabanBus |
12361/12362 | Whack-a-Mole |
16969 | Priority |
20001 | Millenium |
20034/1120 | NetBus |
21544 | Girl Friend |
22222 | Prosiak |
22222 | Rux |
23432 | Asylum |
23456 | Evil FTP |
25685 | Moon Pie |
26274 | Delta |
30100-02 | NetSphere |
31337-38 | Back Orifice |
31338 | DeepBO |
31339 | NetSpyDK |
31666 | BOWhack |
33333 | Prosiak |
34324 | BigGluck, TN |
40412 | The Spy |
40421-26 | Masters Paradise |
47262 | Delta |
50766 | Fore |
53001 | Remote Windows Shutdown |
54321 | SchoolBus |
61466 | Telecommando |
65000 | Devil |