Port 13 - DAYTIME (Daytime Protocol)

Service:

DAYTIME

Protocol:

TCP/UDP

Port:

13

Used for:

Returns human-readable date and time

Why It’s Open

Port 13 provides the Daytime Protocol service, which returns the current date and time in human-readable format. It’s used for time synchronization and system diagnostics.

Common Risks

  • Information disclosure
    Reveals system time and timezone information
  • Amplification attacks
    Can be used in reflection DDoS attacks
  • Network reconnaissance
    Helps map network infrastructure
  • System fingerprinting
    Time format may reveal OS details
  • Resource consumption
    Excessive requests can impact performance

Want to save time on reporting?

Let PentestPad generate, track, and export your reports - automatically.

logo-cta

Enumeration & Testing

Service Detection:

Terminal window
nmap -sV -p 13

Time Query:

Terminal window
nc 13

UDP Time Query:

Terminal window
nc -u 13

What to Look For

CheckpointWhat it means
Time formatDate/time string format and timezone
Service availabilityTCP/UDP protocol support
Rate limitingResponse to rapid consecutive requests
Error handlingBehavior with malformed requests

Mitigation

  • Disable daytime service
    Remove unnecessary time services
  • Use NTP instead
    Implement proper Network Time Protocol
  • Firewall restrictions
    Block external access to port 13
  • Monitor usage
    Log and analyze daytime service requests
  • Rate limiting
    Implement request throttling

TL;DR

  • Port 13 = Daytime Protocol service
  • Protocol: TCP/UDP
  • Used for: Returns human-readable date and time
  • Security focus: Proper configuration and monitoring required

Known CVEs and Exploits

  • DDoS amplification attacks – Daytime service used for traffic amplification and reflection attacks
  • Information disclosure vulnerabilities – System time and timezone information exposure for reconnaissance
  • Service abuse for network scanning – Used by attackers to map network infrastructure and identify active hosts
  • Resource exhaustion attacks – Excessive daytime requests causing denial of service conditions