ProtocolPort(s)Full NameCommon ToolsDescription
FTP20 (data), 21 (control)File Transfer ProtocolFileZilla, Hydra, MetasploitTransfers files between a client and server. Cleartext unless using FTPS.
SMB445, 139Server Message BlockSMBClient, CrackMapExecProtocol for sharing files, printers, and resources over a network (Windows).
HTTP80Hypertext Transfer ProtocolCurl, Burp Suite, NmapStandard web protocol for transferring hypertext (web pages).
DNS53Domain Name SystemDig, Nslookup, ResponderResolves domain names to IP addresses. Also used in DNS-based attacks.
SMTP25, 465, 587Simple Mail Transfer ProtocolTelnet, Swaks, MetasploitSends email. Port 25 is legacy; 465 uses SSL; 587 uses STARTTLS.
NFS111, 2049Network File SystemShowmount, Rpcinfo, NmapShares file systems across a network. Relies on RPC (port 111).
SNMP161 (queries), 162 (traps)Simple Network Management ProtocolSnmpwalk, NmapManages devices on IP networks. Version 1/2c is insecure; v3 adds encryption.
IMAP / POP3143 (IMAP)Internet Message Access Protocol / Post Office ProtocolTelnet, SwaksIMAP retrieves emails from a server. POP3 also retrieves but deletes after download.
MySQL3306 (MySQL), 1433 (MSSQL)MySQL / Microsoft SQL ServerMySQLClient, SQLMapDatabase services for managing relational databases.
SSH22Secure ShellOpenSSH, Putty, HydraSecure remote login and command execution. Uses encrypted communication.
RDP3389Remote Desktop ProtocolRdesktop, MetasploitRemote Desktop Protocol for GUI-based access to Windows systems.
WinRM5985 (HTTP), 5986 (HTTPS)Windows Remote ManagementEvil-WinRM, CrackMapExecRemote management of Windows systems using WS-Management.
Oracle TNS1521Oracle Transparent Network SubstrateSqlplus, ODAT, NmapConnects to Oracle databases using Transparent Network Substrate (TNS).
WMI (wmiexec)135 (RPC), 445 (SMB)Windows Management InstrumentationCrackMapExec, Impacket-WmiexecExecutes commands on Windows via WMI. Relies on DCOM (RPC) and SMB.
PostgreSQL5432PostgreSQLPsql, SQLMapRelational database service similar to MySQL, often used for backend storage.
Telnet23Telecommunications NetworkTelnetAn insecure text-based network protocol for remote access, often used for testing and debugging.
DNS53Domain Name SystemDig, Nslookup, ResponderResolves domain names to IP addresses. Also used in DNS-based attacks.
Kerberos88Kerberos Authentication ProtocolKlist, ImpacketNetwork authentication protocol using tickets to authenticate clients to services.
LDAP389 (LDAP), 636 (LDAPS)Lightweight Directory Access ProtocolLdapsearch, NmapProtocol for accessing and maintaining directory information services over an IP network.
ICMPN/AInternet Control Message ProtocolPing, Hping, NmapUsed for network diagnostics, error reporting, and troubleshooting.