The strongest in history? From 0 to 33600 Logical Port Details (4)

  
        Port: 389
Service: LDAP, ILS
Description: Lightweight Directory Access Protocol and NetMeeting Internet Locator Server share this port.

Port: 443
Service: Https
Description: A web browsing port that provides encryption and another HTTP transport over a secure port.

Port: 456
Service: [NULL]
Description: Trojan HACKERS PARADISE opens this port.

Port: 513
Service: Login, remote login
Description: This is a broadcast from a UNIX computer that uses a cable modem or DSL to log in to a subnet. These people provide information for intruders to enter their systems.

Port: 544
Service: [NULL]
Description: kerberos kshell

Port: 548
Service: Macintosh, File Services (AFP/IP)
Description: Macintosh, file service.

Port: 553
Service: CORBA IIOP (UDP)
Description: You will see the broadcast of this port using cable modem, DSL or VLAN. CORBA is an object-oriented RPC system. Intruders can use this information to enter the system.

Port: 555
Service: DSF
Description: Trojan PhAse1.0, Stealth Spy, IniKiller open this port.

Port: 568
Service: Membership DPA
Description: Membership DPA.

Port: 569
Service: Membership MSN
Description: Membership MSN.

Port: 635
Service: mountd
Description: Linux mountd Bug. This is a popular bug in scanning. Most scans of this port are based on UDP, but the TCP-based mountd is increased (mountd runs on both ports simultaneously). Remember that mountd can run on any port (which port is the portmap query on port 111), but the default port for Linux is 635, just like NFS usually runs on port 2049.

Port: 636
Service: LDAP
Description: SSL (Secure Sockets layer)

Port: 666
Service: Doom Id Software
Description: Trojan Attack FTP, Satanz Backdoor open this port

Port: 993
Service: IMAP
Description: SSL (Secure Sockets layer)

Port: 1001, 1011
Service: [ ,null,null,3],NULL]
Description: Trojan Silencer, WebEx open 1001 port. Trojan Doly Trojan opens port 1011.

Port: 1024
Service: Reserved
Description: It is the beginning of a dynamic port. Many programs do not care which port to use to connect to the network. They request the system to assign them the next idle port. Based on this allocation, starting at port 1024. This means that the first request to the system will be assigned to port 1024. You can reboot the machine, open Telnet, open a window and run natstat -a. You will see that Telnet is assigned 1024 ports. There are also SQL sessions that use this port and 5000 ports.

Port: 1025, 1033
Service: 1025: network blackjack 1033: [NULL]
Description: Trojan netspy open these 2 ports.

Port: 1080
Service: SOCKS
Description: This protocol passes through the firewall in a channel mode, allowing people behind the firewall to access the Internet through an IP address. In theory it should only allow internal communication to reach the INTERNET. But because of the wrong configuration, it will allow attacks outside the firewall to pass through the firewall. This error often occurs with WinGate, which is often seen when joining an IRC chat room.

Port: 1170
Service: [NULL]
Description: Trojan Streaming Audio Trojan, Psyber Stream Server, Voice open this port.

Port: 1234, 1243, 6711, 6776
Service: [NULL]
Description: Trojan SubSeven2.0, Ultors Trojan open 1234, 6776 ports. Trojan SubSeven1.0/1.9 ​​open ports 1243, 6711, 6776.

Port: 1245
Service: [NULL]
Description: Trojan Vodoo opens this port.

Port: 1433
Service: SQL
Description: Microsoft SQL Service open port.

Port: 1492
Service: stone-design-1
Description: Trojan FTP99CMP opens this port.

Port: 1500
Service: RPC client fixed port session querIEs
Description: RPC client fixed port session query

Port: 1503
Service: NetMeeting T.120 < BR> Description: NetMeeting T.120

Port: 1524
Service: ingress
Description: Many attack scripts will install a backdoor SHELL on this port, especially for Sendmail and RPC services in SUN system. The script for the vulnerability. If you just installed a firewall and you see the connection attempt on this port, it is probably the above reason. You can try Telnet to this port on the user's computer to see if it will give you a SHELL. This problem also exists when connecting to 600/pcserver.

Copyright © Windows knowledge All Rights Reserved