Home

Attack Rate

Protocols

Demographics

Entity Activity

Heatmap

Anomalies

Ports

About

Labels: Windows PowerShell Default psSession Port Windows Remote Management Service
Synopsis for TCP port 5985
Internet TCP port 5985 is primarily used by Windows Remote Management (WinRM), a Microsoft protocol that allows for remote management and execution of commands on Windows machines. This protocol is also utilized by PowerShell Remoting, an automation framework from Microsoft. Additionally, it's used by WS-Management, a standard web services protocol used for remote software and hardware management. The port may also be used by other software that implements these protocols.
Risk Scenario for TCP port 5985
TCP port 5985 is commonly used for Windows Remote Management (WinRM) service, which allows for remote management of Windows servers. In the past, hackers have exploited this port by using it as an entry point to gain unauthorized access to the system. They typically do this by launching brute force attacks to guess the credentials or by exploiting any existing vulnerabilities in the WinRM service. Once they gain access, they can execute arbitrary commands, install malicious software, or steal sensitive data. Therefore, it's crucial to secure this port by using strong credentials, enabling encryption, and regularly updating the software to patch any known vulnerabilities.
Detailed Chart
More Information
Jump to Port: << 5984 | 5986 >>