Port 666 – DOOM (Doom Game Protocol)

Service:

doom

Protocol:

TCP/UDP

Port:

666

Used for:

Doom multiplayer gaming protocol

Why It’s Open

Port 666 is historically associated with the Doom multiplayer gaming protocol and various malware families. While originally used for legitimate gaming, this port has become notorious as a common choice for trojans, backdoors, and other malicious software due to its symbolic number association.

Common Risks

  • Malware communication
    Many trojans use port 666 for command and control
  • Backdoor access
    Remote attackers may gain unauthorized system access
  • Data exfiltration
    Sensitive information can be stolen through malware
  • Botnet participation
    Infected systems may join malicious networks
  • System compromise
    Complete control over infected machines
  • Network propagation
    Malware spreads to other network systems
  • False positive gaming
    Legitimate Doom traffic may mask malicious activity

Want to save time on reporting?

Let PentestPad generate, track, and export your reports - automatically.

logo-cta

Enumeration & Testing

Service Detection:

Terminal window
nmap -sV -p 666
Terminal window
nc 666

Vulnerability Scan:

Terminal window
nmap --script vuln -p 666

What to Look For

CheckpointWhat it means
Service versionIdentify software version and patch level
AuthenticationCheck for default or weak credentials
SSL/TLS configVerify encryption settings if applicable
Access controlsTest for proper authorization mechanisms

Mitigation

  • Keep software updated
    Apply latest security patches
  • Strong authentication
    Use complex passwords and 2FA
  • Access restrictions
    Limit service to trusted networks
  • Monitor activity
    Log and review service usage
  • Disable if unused
    Remove unnecessary services

TL;DR

  • Port 666 = Doom Game Protocol service
  • Protocol: TCP/UDP
  • Used for: Doom multiplayer gaming protocol
  • Security focus: Proper configuration and monitoring required

Known CVEs and Exploits

  • Doom legacy vulnerabilities – Original Doom networking protocol buffer overflow issues
  • CVE-1999-0710 – Doom gaming protocol buffer overflow vulnerability
  • Trojan associations – Various malware families have used port 666 for C&C communication
  • Attack Tool usage – Attack frameworks and penetration testing tools often target this port
  • DDoS amplification – Gaming protocols can be abused for reflection attacks