Share this
A Look at the Most Attacked Ports
by Reflare Research Team on May 15, 2021 7:43:00 PM
Although the number of attacks against most ports remains relatively low, it is critical to understand which ones are the most targeted. You should conduct a rigorous audit, evaluate your own exposure, and act accordingly... or else.
First Published 3rd June 2019 | Latest Refresh 15th May 2021
Ports! Pretty clever image, hu?
4 min read | Reflare Research Team
Port Report
A report released by networking provider F5 on cyber-attacks on Australian targets contains an interesting ranking of the ports that most attacks are directed against. While many of our readers will be familiar with the services in question and won’t be surprised by the ranking, in this research brief we will take a look at just why the most common of these ports are targeted.
Secure Shell - SSH (22)
SSH is targeted for both its ubiquity on Unix machines and the fact that a successful break-in results in immediate command execution privileges. Despite best efforts, weak SSH passwords like “password123” are still disturbingly common, as we are sure you’ve seen.
Such systems are usually compromised within hours of going online. There have also been a small but critical number of vulnerabilities in OpenSSH, the most common SSH server along with OS specific vulnerabilities. Tools for the exploitation of these vulnerabilities as well as for the brute forcing of SSH passwords are readily available, making such attacks easy and relatively effective against unix servers and embedded systems.
Server Message Block - SMB (445)
Microsoft Windows’ file sharing protocol SMB has had a relatively large number of security vulnerabilities and was thus the target of countless worms since the 1990s. In more recent years, the NSA leaks of 2017 resulted in a working exploit used by the agency being released into the wild. These attacks usually target end-user computers and windows servers directly connected to the internet.
Hypertext Transfer Protocol - HTTP (80)
Web application security flaws are exceedingly common and responsible for a large percentage of all cyber security breaches. In the majority of the registered attacks, attackers are merely aiming to identify either server software or web application software with known weaknesses.
Alternative Hypertext Transfer Protocol - HTTP (8088)
8088, along with 8000 and 8080 are ports commonly used for secondary HTTP servers. The reasons for attacks against them are identical to the regular HTTP port.
Some ports are more vulnerable than others.
Session Initiation Protocol - SIP (5060)
SIP is used by many modern messaging, voice calling and video calling solutions. Since the protocol is very complex, many vulnerabilities in it have been found. Configuration mistakes when setting up SIP services that can be exploited by attackers are also common. Attacks can be aimed against end-users or server infrastructure.
MSSQL (1433) & MySQL (3306)
MSSQL (Microsoft) and MySQL (Oracle) are two of the most common SQL databases. Due to shoddy configuration and lacklustre firewall settings, many database servers are directly connected to the internet. This is dangerous not only because vulnerabilities in both are relatively common, but also because the use of weak passwords for development purposes is widespread. As the name implies, databases hold a target’s data and are thus exceedingly valuable targets for attackers.
Telnet (23)
Telnet is the spiritual predecessor to SSH. It is completely unencrypted and insecure by modern standards. Unfortunately, many old embedded systems and industrial control systems still rely on it.
The recent boom in IoT devices developed by teams with little to no security knowledge has led to an outright revival of this protocol which my all means should have died 20 years ago. Attackers target telnet for the same reasons they target SSH: A successful attack leads to immediate command execution privileges in most cases.
Summary
Only by understanding why attackers target certain ports and services can we correctly prioritize risk and create policies, rules and strategies to manage it. Strikingly, in all of the above cases, frequent and timely updates combined with well-enforced secure password policies are enough to prevent the vast majority of attacks from succeeding.
As we have said in past research briefs, information security is a game of fundamentals. By doing the basics well, you can prevent 99% of attacks.
Port vulnerabilities are not the only exploit you need to stay on top of. To identify and mitigate the risks of specific attacks before you find yourself responding to one, read our research briefs on the following related topics.
Share this
- December 2024 (1)
- November 2024 (1)
- October 2024 (1)
- September 2024 (1)
- August 2024 (1)
- July 2024 (1)
- June 2024 (1)
- April 2024 (2)
- February 2024 (1)
- January 2024 (1)
- December 2023 (1)
- November 2023 (1)
- October 2023 (1)
- September 2023 (1)
- August 2023 (1)
- July 2023 (1)
- June 2023 (2)
- May 2023 (2)
- April 2023 (3)
- March 2023 (4)
- February 2023 (3)
- January 2023 (5)
- December 2022 (1)
- November 2022 (2)
- October 2022 (1)
- September 2022 (11)
- August 2022 (5)
- July 2022 (1)
- May 2022 (3)
- April 2022 (1)
- February 2022 (4)
- January 2022 (3)
- December 2021 (2)
- November 2021 (3)
- October 2021 (2)
- September 2021 (1)
- August 2021 (1)
- June 2021 (1)
- May 2021 (14)
- February 2021 (1)
- October 2020 (1)
- September 2020 (1)
- July 2020 (1)
- June 2020 (1)
- May 2020 (1)
- April 2020 (2)
- March 2020 (1)
- February 2020 (1)
- January 2020 (3)
- December 2019 (1)
- November 2019 (2)
- October 2019 (3)
- September 2019 (5)
- August 2019 (2)
- July 2019 (3)
- June 2019 (3)
- May 2019 (2)
- April 2019 (3)
- March 2019 (2)
- February 2019 (3)
- January 2019 (1)
- December 2018 (3)
- November 2018 (5)
- October 2018 (4)
- September 2018 (3)
- August 2018 (3)
- July 2018 (4)
- June 2018 (4)
- May 2018 (2)
- April 2018 (4)
- March 2018 (5)
- February 2018 (3)
- January 2018 (3)
- December 2017 (2)
- November 2017 (4)
- October 2017 (3)
- September 2017 (5)
- August 2017 (3)
- July 2017 (3)
- June 2017 (4)
- May 2017 (4)
- April 2017 (2)
- March 2017 (4)
- February 2017 (2)
- January 2017 (1)
- December 2016 (1)
- November 2016 (4)
- October 2016 (2)
- September 2016 (4)
- August 2016 (5)
- July 2016 (3)
- June 2016 (5)
- May 2016 (3)
- April 2016 (4)
- March 2016 (5)
- February 2016 (4)