Service:
http
Protocol:
TCPPort:
80Used for:
Primary port for serving web pages and web applications over unencrypted HTTPWhy It’s Open
Port 80 is the standard port for HTTP (Hypertext Transfer Protocol) web traffic. It enables web servers to host websites and applications, making it essential for organizations serving content to users. Common web server software uses this port to accept HTTP requests from clients. While HTTPS (port 443) is now standard for security, port 80 remains critical for initial connections and redirecting users to encrypted versions of sites.
Common Risks
- Information Disclosure
Un-encrypted HTTP traffic exposes data like cookies and credentials to interception - Web Application Vulnerabilities
Attacks like SQL injection, XSS, and CSRF frequently target applications here - Directory Traversal
Misconfigurations may unintentionally expose sensitive files - Botnet Targeting
Automated scanners constantly probe port 80 for vulnerable applications - Version Fingerprinting
Server headers can reveal software versions for attackers - API Exposure
Unsecured APIs might be accidentally accessible via HTTP
Want to save time on reporting?
Let PentestPad generate, track, and export your reports - automatically.

Enumeration & Testing
Check if it’s open:
nmap -sT -p 80Basic HTTP request:
curl -v http:///Check server info:
./whatweb http://Full vulnerability scan:
nuclei -u http://What to Look For
| Checkpoint | What it means |
|---|---|
| Default pages exposed | Server may be misconfigured |
| Server version headers | Reveals software for targeting |
| Directory listing enabled | Could expose sensitive files |
| HTTP instead of HTTPS | Unencrypted traffic vulnerable to sniffing |
| Missing security headers | Basic security controls absent |
| Exposed API endpoints | Risk of unauthorized API access |
Mitigation
- Implement HTTPS
Redirect all HTTP traffic to encrypted HTTPS - Security Headers
Enable HSTS, CSP, and X-Frame-Options headers - Remove Version Info
Omit server software details from responses - Access Controls
Configure strict directory permissions and authentication - WAF Protection
Deploy a web application firewall for attack filtering - API Security
Restrict APIs to HTTPS-only access - Regular Scanning
Conduct continuous vulnerability assessments
TL;DR
- Port 80 = HTTP web traffic
- Must redirect to HTTPS
- Primary target for attackers
- Requires robust security controls
- Regular security testing needed
- Monitor for unauthorized access
Known CVEs and Exploits
- CVE-2023-44487 – HTTP/2 rapid reset vulnerability
- CVE-2022-31692 – Spring Framework remote code execution
- CVE-2021-44228 – Log4j remote code execution
- Multiple automated tools available for web vulnerability scanning