← Port Encyclopedia
5900
VNC
TCP
Remote Access Critical Risk
VNC Remote Desktop — screen sharing, weak auth, no encryption by default

🔍 How to Scan Port 5900

nmap -sV -p 5900 target
nmap -sV -sC --script=banner -p 5900 target
nc -zv target 5900

🛡️ Security Considerations

  • Scan port 5900 with nmap -sV to identify the exact service and version
  • If VNC is not needed, close or firewall this port immediately
  • Check for default credentials if a management interface runs on this port
  • Use searchsploit vnc to find known exploits
  • Monitor traffic on port 5900 with Wireshark or tcpdump for anomalies
  • Ensure the service is patched to the latest version to prevent known CVE exploitation

📍 Nearby Ports