[转] Computer port introduction

xiaoxiao2021-03-06  17

Computer port introduction (detailed list)

Transfer from: VC Online

We often see "port" such as 135, 137, 139, 443 in various technical articles, but what is the use of these ports? Will it bring potential threats to our computer? How many ports are useful? If you want to know, come with me: D

Port: 0

Service: reserved

Description: Usually used to analyze the operating system. This method is capable of working because "0" is an invalid port in some systems, which will produce different results when you try to use the usual closing port to connect it. A typical scan, using an IP address of 0.0.0.0, setting an ACK bit and broadcasts Ethernet layer.

Port: 1

Service: TCPMUX

Note: This shows someone is looking for SGI IRIX machines. IRIX is the primary provider of TCPMUX. By default, TCPMUX is opened in this system. IRIX Machines is published as a few default unciprocgeted accounts such as IP, Guest UUCP, NUUCP, DEMOS, TUTOR, DIAG, OUTOFBOX, etc. Many administrators have forgotten to delete these accounts after installation. Therefore, Hacker searches for TCPMUX on the Internet and uses these accounts.

Port: 7

Service: echo

Note: When you see many people search for the Fraggle amplifier, send to X.x.x.0 and X.x.x.255 information.

Port: 19

Service: Character Generator

Description: This is a service that only sends characters. The UDP version will respond to the package containing the spam after receiving the UDP package. The data stream containing the spam when the TCP connection is sent until the connection is closed. Hacker uses IP spoof to launch a DOS attack. Forged two UDP packages between two Chargen servers. The same Fraggle DOS attack is broadcast to this port of the target address with a packet with counterfeit victim IP, and the victim is overloaded in order to respond to this data.

Port: 21

Service: ftp

Description: The port open by the FTP server is used to upload, download. The most common attacker is used to find ways to open anonymous's FTP server. These servers have a readable and writable directory. Trojan Doly Trojan, Fore, Invisible FTP, WebEX, WinCrash, and Blade Runner open port.

Port: 22

Service: SSH

Note: The connection of the TCP and this port established by PCANywhere may be to find SSH. This service has a lot of weaknesses, and if you are configured as a specific mode, many of the versions that use the RSAREF library will have a lot of vulnerabilities.

Port: 23

Service: Telnet

Description: Remote login, intruder is searching for remote login UNIX services. Most cases scan this port is to find the operating system running in the machine. There are other technologies, and the intruder will also find a password. Trojan TiNy Telnet Server opens this port.

Port: 25

Service: SMTP

Description: The port open by the SMTP server is used to send an email. Intruders look for SMTP servers to pass their spam. The invader's account is turned off, and they need to connect to the high bandwidth E-mail server to pass simple information to different addresses. Trojan Antigen, Email Password Sender, Haebu Coceda, Shtrilitz Stealth, WinPC, Winspy are open.

Port: 31

Service: MSG Authentication

Note: Trojan Master Paradise, Hackers Paradise opens this port.

Port: 42

Service: WINS Replication Description: WINS Copy

Port: 53

Service: Domain Name Server (DNS)

Description: The ports open by the DNS server may be attempt to conduct regional delivery (TCP), deceive DNS (UDP) or hidden other communications. Therefore, the firewall often filters or records this port.

Port: 67

Service: Bootstrap Protocol Server

Note: The firewall that is often sent to the broadcast address 255.255.255.255 via DSL and Cable Modem often see data from the broadcast address 255.255.255.255. These machines request an address to the DHCP server. Hacker often enters them, assigns an address to initiate a large number of middleman attacks as partial routers. The client is broadcast to the 68 port broadcast request, and the server responds to the 67-port broadcast. This response uses broadcast because the client still does not know the IP address that can be sent.

Port: 69

Service: Trival File Transfer

Note: Many servers provide this service with BootP to facilitate download startup code from the system. But they often cause the intruder to steal any files from the system due to the error configuration. They can also be used to write files.

Port: 79

Service: Finger Server

Note: Intruders are used to obtain user information, query the operating system, and detect known buffers overflow errors, and respond to from their own machines to other machine finger scans.

Port: 80

Service: http

Description: Used for web browsing. Trojan Executor opens this port.

Port: 99

Service: Metagram Relay

Description: The back door program NCX99 opens this port.

Port: 102

Services: Message Transfer Agent (MTA) -X.400 over TCP / IP

Description: Message Transport Agent.

Port: 109

Service: Post Office Protocol -Version3

Description: POP3 server opens this port for receiving mail, client accessing the server-side mail service. POP3 services have many recognized weaknesses. There is at least 20 weaknesses overflow from the username and password exchange buffer, which means that the invader can enter the system before the truly landing. There are other buffers overflow errors after successfully logging in.

Port: 110

Services: Sun's RPC service all ports

Description: Common RPC services include rpc.mountd, nfs, rpc.statd, rpc.csmd, rpc.ttybd, AMD, etc.

Port: 113

Service: Authentication Service

Note: This is a multi-computer running protocol for identifying TCP connections. This service using standards can get information about many computers. But it can serve as many services, especially those such as FTP, POP, IMAP, SMTP, and IRC. Usually, if you have many customers access these services through the firewall, you will see a number of connection requests for this port. Remember, if this port client will feel slowly connected to the E-mail server on the other side of the firewall. Many firewalls send back RST during blocking of TCP connections. This will stop slow connection.

Port: 119

Service: Network News Transfer Protocol

Description: News News Group Transfer Protocol to carry USENET communication. This port connection is usually people looking for a USENET server. Most ISP limits, only their customers can access their newsgroup servers. Open the newsgroup server will allow / read anyone's post, access the restricted newsgroup server, post anonymous to post or send a spam. Port: 135

Service: Location Service

Note: Microsoft runs DCE RPC End-Point Mapper for this port for its DCOM service. This is similar to the functionality of UNIX 111 ports. Use DCOM and RPC services to register their location by End-Point Mapper on your computer. When remote customers are connected to a computer, they look for the location of the end-point mapper to find the service. Is this port of Hacker Scanning Computer to find this computer running Exchange Server? What version? Some DOS attacks are directly for this port.

Port: 137, 138, 139

Service: NetBIOS Name Service

Description: Where 137, 138 is a UDP port, and this port is used when transmitting a file over an online neighbor. And 139 port: The connection entry through this port is trying to get the NetBIOS / SMB service. This protocol is used for Windows files and printers sharing and Samba. There is also WINS Regisrtation to use it.

Port: 143

Services: Interim Mail Access Protocol V2

Note: Like the security of POP3, many IMAP servers have buffer overflow vulnerabilities. Remember: A Linux worm (ADMV0RM) will breed this port, so many of this port scan from uninformed users who have been infected. These vulnerabilities are very popular when Redhat allows IMAP by default in their Linux release versions. This port is also used in IMAP2, but it is not popular.

Port: 161

Service: SNMP

Note: SNMP allows remote management devices. All configurations and run information are stored in the database, which is available to SNMP. Many administrators' error configuration will be exposed to the Internet. CACKERS will try to use the default password public, private access system. They may test all possible combinations. The SNMP package may be incorrectly pointing to the user's network.

Port: 177

Service: x Display Manager Control Protocol

Note: Many intruders have access to the X-Windows operator through it, and it needs to open the 6000 port.

Port: 389

Service: LDAP, ILS

Description: Light directory access protocols and NetMeeting Internet Locator Server share this port.

Port: 443

Service: https

Note: Web browsing ports provide an encryption and another HTTP transmitted through security port.

Port: 456

Service: [NULL]

Description: Trojan Hackers Paradise opens this port.

Port: 513

Service: Login, Remote Login

Description: Yes from the Unix computer sent from the subnet to the subnet using Cable Modem or DSL. These people provide information for invaders into their system.

Port: 544

Service: [NULL]

Description: Kerberos Kshell

Port: 548

Services: Macintosh, File Services (AFP / IP)

Description: Macintosh, file service.

Port: 553 Services: CORBA IIOP (UDP)

Note: This port broadcast will be seen using Cable Modem, DSL or VLAN. CORBA is an object-oriented RPC system. Intrusioners can use this information to enter the system.

Port: 555

Service: DSF

Description: Trojan PHASE 1.0, Stealth Spy, INIKILLER opens this port.

Port: 568

Service: MEMBERSHIP DPA

Description: Membership DPA.

Port: 569

Service: MEMBERSHIP MSN

Description: Membership MSN.

Port: 635

Service: MOUNTD

Description: Linux's MountD bug. This is a popular bug that scanned. Most of the scan for this port is UDP, but TCP-based mountd is increased (MountD is running on two ports at the same time). Remember that MountD can run at any port (which port is, you need to do a portmap query at port 111), just Linux default port is 635, just like NFS usually runs on 2049 port.

Port: 636

Service: LDAP

Description: SSL (Secure Sockets Layer)

Port: 666

Service: Doom ID Software

Description: Trojan Attack FTP, Satanz Backdoor open this port

Port: 993

Service: IMAP

Description: SSL (Secure Sockets Layer)

Port: 1001,1011

Service: [NULL]

Description: Trojan Silencer, WebEx opens 1001 ports. Trojan Doly Trojan open 1011 port.

Port: 1024

Service: reserved

Note: It is the beginning of dynamic ports, and many programs do not care which port connection network, they request the system to assign them the next idle port. Based on this allocation starts from port 1024. This means that the first request to issue a request to the 1024 port. You can restart the machine, open Telnet, and open a window to run natstat -a will see Telnet assigned 1024 port. There is also SQL Session also uses this port and 5000 ports.

Port: 1025, 1033

Services: 1025: Network BlackJack 1033: [NULL]

Description: Trojan NetSPY opens these 2 ports.

Port: 1080

Service: SOCKS

Description: This protocol passes through the firewall in a channel, allowing people behind the firewall to access the Internet through an IP address. In theory it should only allow the internal communication to arrive outside the Internet. However, due to the wrong configuration, it allows attacks located outside the firewall through the firewall. Wingate often happens, which often sees this situation when joining the IRC chat room.

Port: 1170

Service: [NULL]

Description: Trojan streaming audio Trojan, Psyber Stream Server, Voice opens this port.

Port: 1234, 1243, 6711, 6776

Service: [NULL]

Description: Trojan Subseven 2.0, Ultors Trojan opens 1234,6776 ports. Trojans Subseven 1.0 / 1.9 open 1243, 6711,6776 ports. Port: 1245

Service: [NULL]

Description: Trojan VODOO opens this port.

Port: 1433

Service: SQL

Description: Microsoft's SQL service open port.

Port: 1492

Service: stone-design-1

Description: Trojan ftp99cmp open this port.

Port: 1500

Services: RPC Client Fixed Port Session Queries

Description: RPC Customer fixed port session query

Port: 1503

Service: NetMeeting T.120

Description: NetMeeting T.120

Port: 1524

Service: Ingress

Note: Many attack scripts will install a backdoor shell on this port, especially for the script of Sendmail and RPC service vulnerabilities in the Sun system. If you just install the firewall, you will see the connection at this port, which is likely to be the above reasons. You can try Telnet to this port on the user's computer to see if it will give you a shell. This issue is also available to 600 / PCServer.

Port: 1600

Service: ISSD

Description: Trojan Shivka-Burka opens this port.

Port: 1720

Service: Netmeeting

Description: NetMeeting H.233 Call Setup.

Port: 1731

Service: Netmeeting Audio Call Control

Description: NetMeeting audio call control.

Port: 1807

Service: [NULL]

Description: Trojan spysender opens this port.

Port: 1981

Service: [NULL]

Description: Trojan Shockrave opens this port.

Port: 1999

Service: Cisco Identification Port

Description: Trojan Backdoor opens this port.

Port: 2000

Service: [NULL]

Description: Trojan Girlfriend 1.3, Millenium 1.0 opens this port.

Port: 2001

Service: [NULL]

Description: Trojan Millenium 1.0, Trojan COW opens this port.

Port: 2023

Service: xinuexpansion 4

Description: Trojan Pass Ripper opens this port.

Port: 2049

Service: NFS

Description: The NFS program is often running on this port. You usually need to access portmapper query which port is running.

Port: 2115

Service: [NULL]

Description: Trojan bugg opens this port.

Port: 2140, 3150

Service: [NULL]

Description: Trojan Deep Throat 1.0 / 3.0 opens this port.

Port: 2500

Services: RPC Client Using A Fixed Port Session Replication

Description: Apply a fixed port session replication RPC customer

Port: 2583

Service: [NULL]

Description: Trojan WinCrash 2.0 opens this port.

Port: 2801

Service: [NULL] Description: Trojan phineas phucker opens this port.

Port: 3024, 4092

Service: [NULL]

Description: Trojan WinCrash opens this port.

Port: 3128

Service: Squid

Description: This is the default port of the Squid HTTP proxy server. The attacker scans this port is to search for an anonymous access to the Internet. You will also see ports 8000, 8001, 8080, 8888 of other proxy servers. Another reason for scanning this port is that the user is entering the chat room. Other users will also verify this port to determine if the user's machine supports the agent.

Port: 3129

Service: [NULL]

Description: Trojan Master Paradise opens this port.

Port: 3150

Service: [NULL]

Description: Trojan The Invasor opens this port.

Port: 3210, 4321

Service: [NULL]

Description: Trojan Schoolbus open this port

Port: 3333

Service: DEC-Notes

Description: Trojan Prosiak opens this port

Port: 3389

Service: Super Terminal

Description: The Windows 2000 terminal opens this port.

Port: 3700

Service: [NULL]

Description: Trojan Portal of Doom open this port

Port: 3996,4060

Service: [NULL]

Description: Trojan RemoteanyTHING open this port

Port: 4000

Service: QQ client

Description: Tencent QQ client opens this port.

Port: 4092

Service: [NULL]

Description: Trojan WinCrash opens this port.

Port: 4590

Service: [NULL]

Description: Trojan ICQTROJAN opens this port.

Port: 5000, 5001, 5321, 50505 Services: [NULL]

Description: Trojan Blazer5 opens 5000 ports. Trojan Sockets de Troie Open 5000, 5001, 5321, 50505 port.

Port: 5400, 5401, 5402

Service: [NULL]

Note: Trojan Blade Runner opens this port.

Port: 5550

Service: [NULL]

Description: Trojan XTCP opens this port.

Port: 5569

Service: [NULL]

Description: Trojan Robo-Hack opens this port.

Port: 5632

Service: pcanywere

Description: Sometimes a lot of scans of this port is dependent on the location where users are. When the user opens PCANYWERE, it automatically scans the local area network C-class network to find a possible agent (here the agent refers to Agent instead of proxy). Intrudes will also find a computer that opens this service. So you should look at this source address of this scan. Some scanning packs of PCANYWERE often contain the UDP packets of port 22.

Port: 5742

Service: [NULL]

Description: Trojan WinCrash1.03 opens this port.

Port: 6267

Service: [NULL]

Description: Trojan Guangxiang girl opens this port.

Port: 6400

Service: [NULL]

Description: Trojan The Thing opens this port.

Port: 6670,6671

Service: [NULL]

Description: Trojan Deep Throat opens 6670 port. Deep Throat 3.0 open 6671 port. Port: 6883

Service: [NULL]

Description: Trojan deltasource opens this port.

Port: 6969

Service: [NULL]

Description: Trojan Gatecrasher, Priority opens this port.

Port: 6970

Service: Reaudio

Note: Reaudio client receives audio data streams from the UDP port of the server's 6970-7170. This is set by the TCP-7070 port externally control connection.

Port: 7000

Service: [NULL]

Description: Trojan Remote Grab opens this port.

Port: 7300, 7301, 7306, 7307, 7308

Service: [NULL]

Description: Trojan NetMonitor opens this port. The additional NetSPY1.0 also opens 7306 ports.

Port: 7323

Service: [NULL]

Description: Sygate server side.

Port: 7626

Service: [NULL]

Description: Trojan giscier opens this port.

Port: 7789

Service: [NULL]

Description: Trojan Ickiller opens this port.

Port: 8000

Service: OICQ

Description: Tencent QQ server is open this port. '

Port: 8010

Service: Wingate

Description: Wingate agent opens this port.

Port: 8080

Service: proxy port

Description: WWW proxy opens this port.

Port: 9400, 9401, 9402

Service: [NULL]

Description: Trojan Incommand 1.0 opens this port.

Port: 9872, 9873, 9874, 9875, 10067, 10167

Service: [NULL]

Description: Trojan Portal of Doom open this port

Port: 9989

Service: [NULL]

Description: Trojan Ini-Killer opens this port.

Port: 11000

Service: [NULL]

Description: Trojan Sennaspy opens this port.

Port: 11223

Service: [NULL]

Description: Trojan Progenic Trojan opens this port.

Port: 12076,61466

Service: [NULL]

Description: Trojan Telecommando opens this port.

Port: 12223

Service: [NULL]

Description: Trojan Hack'99 Keylogger opens this port.

Port: 12345, 12346

Service: [NULL]

Description: Trojan Netbus1.60 / 1.70, Gabanbus opens this port.

Port: 12361

Service: [NULL]

Description: Trojan WHACK-A-MOLE opens this port.

Port: 13223

Service: Powwow

Description: Powwow is a Tribal Voice chat program. It allows users to open private chats at this port. This process is very aggressive for establishing a connection. It will be stationed in this TCP port. A connection request similar to a heartbeat interval. If a dial user inherits the IP address from another chat, there will be many different people to test this port. This protocol uses opng as the first 4 bytes of its connection request.

Port: 16969

Service: [NULL] Description: Trojan priority opens this port.

Port: 17027

Service: Conducent

Description: This is an outgoing connection. This is because someone has a shared software with Conducent "ADBOT" inside the company. Conducent "Adbot" is an advertising service for shared software. A popular software using this service is pkware.

Port: 19191

Service: [NULL]

Description: Trojan Blue flame opens this port.

Port: 20000, 20001

Service: [NULL]

Description: Trojan Millennium opens this port.

Port: 20034

Service: [NULL]

Description: Trojan NetBus Pro opens this port.

Port: 21554

Service: [NULL]

Description: Trojan girlfriend opens this port.

Port: 22222

Service: [NULL]

Description: Trojan Prosiak opens this port.

Port: 23456

Service: [NULL]

Description: Trojan Evil FTP, UGLY FTP opens this port.

Port: 26274, 47262

Service: [NULL]

Description: Trojan Delta opens this port.

Port: 27374

Service: [NULL]

Description: Trojan Subseven 2.1 opens this port.

Port: 30100

Service: [NULL]

Description: Trojan NetSphere opens this port.

Port: 30303

Service: [NULL]

Description: Trojan Socket23 opens this port.

Port: 30999

Service: [NULL]

Description: Trojan Kuang opens this port.

Port: 31337, 31338

Service: [NULL]

Description: Trojan BO (Back Orific) opens this port. In addition, the Trojan Deepbo is also open 31338 port.

Port: 31339

Service: [NULL]

Description: Trojan NetSPY DK opens this port.

Port: 31666

Service: [NULL]

Description: Trojan Bowhack opens this port.

Port: 33333

Service: [NULL]

Description: Trojan Prosiak opens this port.

Port: 34324

Service: [NULL]

Description: Trojan Tiny Telnet Server, Biggluck, TN open this port.

Port: 40412

Service: [NULL]

Description: Trojan the spy opens this port.

Port: 40421,40422,40423,40426,

Service: [NULL]

Description: Trojan Masters Paradise opens this port.

Port: 43210, 54321

Service: [NULL]

Description: Trojan Schoolbus 1.0 / 2.0 opens this port.

Port: 44445

Service: [NULL]

Description: Trojan HAPPYPIG opens this port.

Port: 50766

Service: [NULL]

Description: Trojan Fore open this port.

Port: 53001

Service: [NULL]

Note: Trojan Remote Windows Shutdown opens this port.

Port: 65000

Services: [NULL] Description: Trojan Devil 1.03 opens this port.

Port: 88

Description: Kerberos KRB5. In addition, TCP 88 port is also this purpose.

Port: 137

Description: SQL Named Pipes Encryption over Other Protocols Name Lookup (SQL Name Links on Other Protocol Names) and SQL RPC Encryption over Other Protocols Name Lookup (SQL RPC Encryption Technology on Other Protocol Name) and WINS NetBT Name Service (WINS NetBT Name Service) and WINS Proxy use this port.

Port: 161

Description: Simple Network Management Protocol (SMTP) (Simple Network Management Agreement)

Port: 162

Description: SNMP TRAP (SNMP traps)

Port: 445

Description: Common Internet File System (CIFS) (Public Internet File System)

Port: 464

Description: Kerberos Kpasswd (V5). In addition, TCP's 464 port is also this purpose.

Port: 500

Description: Internet Key Exchange (IKE) (Internet Key Exchange)

Port: 1645, 1812

Description: Remot Authentication Dial-in User Service (Routing and Remote Access) (Remote Certified Dial User Service)

Port: 1646, 1813

Description: Radius Accounting (Radius Accountment (Route and Remote Access))

Port: 1701

Description: Layer Two Tunneling Protocol (L2TP) (Layer 2 Tunnel Agreement)

Port: 1801, 3527

Description: Microsoft Message Queue Server (Microsoft Message Queue Server). There is also the same use of TCP 135, 1801, 2101, 2103, and 2105.

Port: 2504

Description: NetWork load balancing (Network Balance Load)

0 usually used to analyze the operating system. This method can work because "0" in some systems is invalid port, when you try to use a usual closed port

Different results will occur when connecting it. A typical scan: use the IP address of 0.0.0.0, set ACK bits and broadcast in Ethernet

转载请注明原文地址:https://www.9cbs.com/read-44921.html

New Post(0)