Service:
Protocol:
UDPPort:
123Used for:
Time synchronization across devices on a networkWhy It’s Open
NTP is one of those services you often find open on infrastructure devices, especially servers, routers, and domain controllers. Accurate timekeeping is essential for log correlation, authentication protocols (e.g., Kerberos), scheduled tasks, and even certificate validation.
Common Risks
Although NTP might seem harmless, leaving it exposed - especially to the public internet - can lead to:
- **NTP Amplification Attacks: **Used in DDoS attacks. A small request from an attacker leads to a large response from the NTP server, overwhelming a target.
- **Information Disclosure: **Misconfigured NTP servers can leak version info, system uptime, and internal IPs.
- **Spoofing/Time Shifting: **Manipulating NTP responses can desynchronize systems, breaking logs or authentication.
Want to save time on reporting?
Let PentestPad generate, track, and export your reports - automatically.

Enumeration & Testing
Check if it’s open
nmap -sU -p 123nmap -sU -p 123 --script=ntp-infoUse ntpdate to query
ntpdate -qNTP monlist abuse check
Some legacy servers still support the vulnerable monlist command.
ntpdc -n -c monlistIf the server responds with a list of recent clients, it’s vulnerable to abuse.
What to Look For
| Checkpoint | What it means |
|---|---|
monlist available | Vulnerable to amplification |
| Public NTP exposed | Should not be internet-facing |
Outdated ntpd | May be vulnerable to CVEs |
| Leaking version info | Enables fingerprinting & targeting |
Known Exploits
- CVE-2013-5211
The monlist feature in ntpd allows remote attackers to cause a denial of service (traffic amplification) via forged requests, exploited in the wild in December 2013.
Mitigation
- Block UDP/123 from external networks using firewall rules.
- Use authenticated NTP (e.g., with symmetric keys or Autokey) for snesitive systems.
- Regularly update
ntpdor replace with more secure alternatives likechrony, - Limit commands via NTP configuration:
restrict default kod nomodify notrap nopeer noqueryrestrict -6 default kod nomodify notrap nopeer noqueryReal-World Example
In 2020, many outdated public NTP servers were still vulnerable to monlist, which was heavily exploited in DDoS attacks, peaking over **400 Gbps **in traffic. Even large hosting providers were affected because of default configurations left unchecked.
TL;DR
- Service: NTP (Time Synchronization)
- Default Port: 123/UDP
- Risks: Denial of service, amplification attacks
- Mitigation: Apply patches, disable monlist, restrict access