The sub-techniques beta is now live! Read the release blog post for more info.

Uncommonly Used Port

Adversaries may use non-standard ports to exfiltrate information.

ID: T1509
Tactic Type: Post-Adversary Device Access
Tactic: Command And Control
Platform: Android, iOS
Version: 1.0
Created: 01 August 2019
Last Modified: 11 September 2019

Procedure Examples

Name Description

Exodus Two attempts to connect to port 22011 to provide a remote reverse shell.[2]


FlexiSpy can communicate with the command and control server over ports 12512 and 12514.[1]


Mitigation Description
Application Vetting

Application vetting reports may show network communications performed by the application, including hosts, ports, protocols, and URLs.


Detection would most likely be at the enterprise level, through packet and/or netflow inspection. Many properly configured firewalls may also naturally block command and control traffic over non-standard ports.