332 words
2 minutes
Security Inspection Headache? Here’s the Ultimate High-Risk Port & Forbidden File Upload Checklist!

Does the mere mention of a major security audit or “heavy protection period” trigger anxiety? Unsure which ports to close or how to harden Web security? Don’t panic. We’ve compiled the ultimate solution: a centralized summary of all high-risk ports and forbidden file extensions. This is the only reference guide you’ll ever need.

I. Critical High-Risk Port Checklist#

Core Principle: Attack Surface Reduction—if it’s not essential, shut it down.

While most modern firewalls utilize a “Default Deny” (Reject All) baseline, many administrators add an “Any-to-Any” permit rule at the top just to save time.

As an engineer who recently entered the field, I’ve seen this “shortcut” far too often.

Let’s be clear: open policies might feel convenient now, but they lead to forensic nightmares later. Don’t wait for a breach to regret your choices. We strongly recommend checking and closing the following ports immediately for public access.

1.1 Remote Access Ports#

PortProtocolPurpose
22TCPSSH
23TCPTELNET
3389TCPRDP
5900-5904TCPVNC

Database Ports#

1.2.1 Relational Databases (RDBMS)#

PortProtocolPurpose
1433TCPMicrosoft SQL
1521TCPOracle DB
3306TCPMySQL/MariaDB
5432TCPPostgreSQL
50000TCPIBM DB2
5236TCPDameng (DM)
54321TCPKingbase
5866TCPHighGo
30100TCPGaussDB
2881-2882/2886TCPOceanBase

1.2.2 NoSQL Databases#

PortProtocolPurpose
6379TCPRedis
27017/27018TCPMongoDB
9042TCPCassandra
9200TCPElasticsearch
5984TCPCouchDB
16000TCPHBase
8091TCPCouchbase
8086TCPInfluxDB
9042TCPScyllaDB

1.2.3 Graph & Vector Databases#

PortProtocolPurpose
7687TCPNeo4j
8529TCPArangoDB
14240TCPTigerGraph
8080TCPDGraph

1.2.4 Database Management Tools#

PortProtocolPurpose
80/443TCPphpMyAdmin
80/443TCPpgAdmin
80/443TCPAdminier
8080TCPBytebase

1.3 File Sharing & Protocol Ports#

PortProtocolPurpose
21TCPFTP
139/445TCPSMB
593TCPAFP
2049TCPNFS

1.4 Critical Middleware & Vulnerable Services#

PortProtocolPurpose
135/136/137/138TCP/UDPWindows RPC
139/445TCP/UDPSMB
161TCP/UDPSNMP

1.5 Other Vulnerable Services#

PortProtocolPurpose
8848TCPNacos
3888/2181TCPZookpeer
9001TCPSupervisor
7077TCPSpark
9092TCPKafka
7001TCPWebLogic

II. Forbidden File Upload Extension Checklist#

Weak file type validation is equivalent to handing over system execution privileges. The fundamental rule: Validate not just the extension, but also the file content (Magic Bytes) and MIME type.

2.1 System Executables & Scripts#

Risk: These can execute commands directly on the server or client side; they are the highest risk category.

  • Windows: .exe, .msi, .com, .scr, .bat, .cmd, .ps1, .vbs, .vbe
  • Linux: .sh
  • Genera: .jar

2.2 Web Executable Scripts#

Risk: If uploaded to a web directory, accessing these files triggers code execution, leading to a WebShell and total server compromise.

  • PHP: .php, .php3, .php4, .php5, .php6, .php7, .phtml, .phps, .phar
  • ASP.NET: .asp, .aspx, .asa, .asax, .ascx, .ashx, .asmx
  • JSP: .jsp, .jspx, .jspf
  • Other: .py, .pl, .cgi, .cfm, .cfml

2.3 Configuration & Exploitation Files#

Risk: Used to overwrite configurations, leak info, or launch XSS/XXE attacks.

  • Apache: .htaccess (Can override server rules to execute arbitrary files).
  • Configs: .ini, .conf, .config:(May contain sensitive credentials).
  • Markup:
    • .xml: Risk of XXE (XML External Entity) injection.
    • .html, .htm, .svg:Can embed JavaScript for XSS attacks.
Security Inspection Headache? Here’s the Ultimate High-Risk Port & Forbidden File Upload Checklist!
https://fuwari.vercel.app/posts/321d3617-2a6d-40f4-809d-59837206ebf3/
Author
Ryan Zhang
Published at
2025-09-03
License
CC BY-NC-SA 4.0
This content has been translated with the assistance of AI tools, including ChatGPT, Gemini, and Qwen. While efforts have been made to ensure accuracy and clarity, minor discrepancies may exist. Please refer to the original text for authoritative interpretation if needed.