Windows system port Daquan

  
                

The Windows port can be thought of as the gateway to communication between the computer and the outside world. A logical port generally refers to a port in the TCP/IP protocol. The port number ranges from 0 to 65535, such as port 80 for browsing web services, port 21 for FTP services, and so on. Today, Xiaobian compiled a detailed description of the Windows system port, as follows:

Port: 0

Service: Reserved

Description: Usually used to analyze the operating system . This method works because in some systems,  0” is an invalid port, and when you try to connect to it using the usual closed port, it will produce different results. A typical scan that uses an IP address of 0.0.0.0, sets the ACK bit and broadcasts it at the Ethernet layer.

Port: 1

Service: tcpmux

Description: This shows that someone is looking for a SGI Irix machine. Irix is ​​the main provider of tcpmux, and tcpmux is turned on by default in this system. The Irix machine is released with several default password-free accounts, such as IP, GUEST UUCP, NUCCP, DEMOS, TUTOR, DIAG, OUTOFBOX, etc. Many administrators forget to delete these accounts after installation. So HACKER searches tcpmux on the INTERNET and uses these accounts.

Port: 7

Service: Echo

Description: Can see information sent to X.X.X.0 and X.X.X.255 when many people search for Fraggle amplifiers.

Port: 19

Service: Character Generator

Description: This is a service that only sends characters. The UDP version will respond to packets containing junk characters after receiving the UDP packet. When a TCP connection is made, a stream containing garbage characters is sent until the connection is closed. HACKER can use IP spoofing to launch DoS attacks. Forged UDP packets between two chargen servers. Similarly, the Fraggle DoS attack broadcasts a packet with a fake victim IP to this port on the destination address, and the victim is overloaded in response to the data.

Port: 21

Service: FTP

Description: The port opened by the FTP server for uploading and downloading. The most common attackers are used to find ways to open an anonymous FTP server. These servers have a readable and writable directory. Ports opened by Trojan Doly Trojan, Fore, Invisible FTP, WebEx, WinCrash, and Blade Runner.

Port: 22

Service: Ssh

Description: The TCP established by PcAnywhere and the connection to this port may be for ssh. This service has a number of vulnerabilities. If configured into a specific mode, many versions of the RSAREF library will have many vulnerabilities.

Port: 23

Service: Telnet

Description: Remote login, the intruder is searching for remote login UNIX services. In most cases this port is scanned to find the operating system on which the machine is running. There are other techniques that intruders can also find passwords. The Trojan Tiny Telnet Server opens this port.

Port: 25

Service: SMTP

Description: The port opened by the SMTP server to send mail. Intruders look for SMTP servers to pass their SPAM. The intruder's account is closed and they need to connect to a high-bandwidth E-mail server to pass simple messages to different addresses. Trojan Antigen, Email Password Sender, Haebu Coceda, Shtrilitz Stealth, WinPC, WinSpy all open this port.

Port: 31

Service: MSG Authentication

Description: Trojan Master Paradise, Hackers Paradise open this port. Previous12Next page Total 2 pages

Copyright © Windows knowledge All Rights Reserved