← Port Encyclopedia
3389
RDP
TCP
Remote Access
Critical Risk
Remote Desktop Protocol — Windows remote access, BlueKeep, brute force, NLA bypass
🔍 How to Scan Port 3389
nmap -sV -p 3389 target
nmap -sV -sC --script=banner -p 3389 target
nc -zv target 3389
🛡️ Security Considerations
- Scan port 3389 with
nmap -sVto identify the exact service and version - If RDP is not needed, close or firewall this port immediately
- Check for default credentials if a management interface runs on this port
- Use
searchsploit rdpto find known exploits - Monitor traffic on port 3389 with Wireshark or tcpdump for anomalies
- Ensure the service is patched to the latest version to prevent known CVE exploitation