Port 80 – HTTP (Hypertext Transfer Protocol)

Service:

http

Protocol:

TCP

Port:

80

Used for:

Primary port for serving web pages and web applications over unencrypted HTTP

Why It’s Open

Port 80 is the standard port for HTTP (Hypertext Transfer Protocol) web traffic. It enables web servers to host websites and applications, making it essential for organizations serving content to users. Common web server software uses this port to accept HTTP requests from clients. While HTTPS (port 443) is now standard for security, port 80 remains critical for initial connections and redirecting users to encrypted versions of sites.

Common Risks

  • Information Disclosure
    Un-encrypted HTTP traffic exposes data like cookies and credentials to interception
  • Web Application Vulnerabilities
    Attacks like SQL injection, XSS, and CSRF frequently target applications here
  • Directory Traversal
    Misconfigurations may unintentionally expose sensitive files
  • Botnet Targeting
    Automated scanners constantly probe port 80 for vulnerable applications
  • Version Fingerprinting
    Server headers can reveal software versions for attackers
  • API Exposure
    Unsecured APIs might be accidentally accessible via HTTP

Want to save time on reporting?

Let PentestPad generate, track, and export your reports - automatically.

logo-cta

Enumeration & Testing

Check if it’s open:

Terminal window
nmap -sT -p 80

Basic HTTP request:

Terminal window
curl -v http:///

Check server info:

Terminal window
./whatweb http://

Full vulnerability scan:

Terminal window
nuclei -u http://

What to Look For

CheckpointWhat it means
Default pages exposedServer may be misconfigured
Server version headersReveals software for targeting
Directory listing enabledCould expose sensitive files
HTTP instead of HTTPSUnencrypted traffic vulnerable to sniffing
Missing security headersBasic security controls absent
Exposed API endpointsRisk of unauthorized API access

Mitigation

  • Implement HTTPS
    Redirect all HTTP traffic to encrypted HTTPS
  • Security Headers
    Enable HSTS, CSP, and X-Frame-Options headers
  • Remove Version Info
    Omit server software details from responses
  • Access Controls
    Configure strict directory permissions and authentication
  • WAF Protection
    Deploy a web application firewall for attack filtering
  • API Security
    Restrict APIs to HTTPS-only access
  • Regular Scanning
    Conduct continuous vulnerability assessments

TL;DR

  • Port 80 = HTTP web traffic
  • Must redirect to HTTPS
  • Primary target for attackers
  • Requires robust security controls
  • Regular security testing needed
  • Monitor for unauthorized access

Known CVEs and Exploits

  • CVE-2023-44487 – HTTP/2 rapid reset vulnerability
  • CVE-2022-31692 – Spring Framework remote code execution
  • CVE-2021-44228 – Log4j remote code execution
  • Multiple automated tools available for web vulnerability scanning