|
以下这些是我搜集的一些黑客软件的连接端口,有些朋友经常问我一些关于端口名称的问题,我在这里做一个列表,将端口与名称集中公布,这样,方便你来分析端口的安全性,如果我的列表不全,或者你有新发现,或者是我这里有错误,那么,请你一定要告诉我,大家一起把他完善了。
) h' O' ?- V& J' o7 d5 o& k3 C/ E" {% M9 K6 O( q9 `
以下数据仅作参考
7 |5 S/ X# L, ^4 g
# V' ^+ V2 e; s" {: `: a 协议 端口=黑客程序 & Q7 u* C0 @% Y( \8 m
( t! R" _( Z" ` TCP 7=Echo
1 S4 L6 V& {" H
0 y8 R8 J' }$ n TCP 20=FTP Data
( ^# H7 l, h8 r7 s5 B6 z) L" [) k' L9 u: ^/ z0 E9 q
TCP 21=Back Construction, Blade Runner, Doly Trojan, Fore, FTP trojan, Invisible FTP, Larva, WebEx, WinCrash
1 k S3 X9 P9 g+ [9 A2 @9 P9 N7 M- M6 x3 v j+ ^& _
TCP 23=Telnet, Tiny Telnet Server (= TTS)
, E+ e4 q3 \ l+ B/ g$ r7 L) Z3 J Y, E H* b+ t4 ?( q
TCP 25=SMTP, Ajan, Antigen, Email Password Sender, Happy 99, Kuang2, ProMail trojan, Shtrilitz, Stealth, Tapiras, Terminator, WinPC, WinSpy
3 U" D. h4 C& C
: Z4 j2 l% n' v V2 H$ v TCP 31=Agent 31, Hackers Paradise, Masters Paradise 7 i( j% x5 z! C( b$ z% r
5 f) b4 p* _6 f/ Z9 u8 S; D; V6 ~ TCP 41=DeepThroat
+ }$ X# Q, ^8 J$ V t ^ f9 c
1 j. B" F* U% | TCP 43=WHOIS
3 B* Y9 ?8 ^. {0 W6 V9 h- Q1 M: g$ S4 p9 D3 L7 J
TCP 53=DNS,Bonk (DOS Exploit) 1 v7 ?# N$ N) ~$ C/ W
0 l h. F! t9 Z6 D+ i TCP 59=DMSetup ; ^/ ^# @# z% t$ y/ t
) }" |1 E& O% x! J3 r+ d, ^, r TCP 70=Gopher
5 w6 V. O' C$ |, Z4 T6 l& o6 I* T( h2 ^3 a
TCP 79=Firehotcker, Finger
+ k0 R$ G% x4 ], s8 W
( Q# T! }$ i2 }/ L3 f/ U& C TCP 80=Http服务器, Executor, RingZero ; j' N; I) B. v6 l& |3 N2 o4 S
; W1 v4 e# [9 _" {4 |% g0 S TCP 99=Hidden Port 3 E! y4 ~. ?" H: [! {# V
; U' i+ O/ t6 R+ R" _5 }# i TCP 110=Pop3服务器, ProMail ' c4 S5 E" ? o% W. T {
+ k0 H q9 N; h9 W) `) J9 s! r
TCP 113=Kazimas, Auther Idnet $ G9 u$ R" P5 K2 t0 w$ Z, p% n# P
: n& G/ }7 y8 d- K) n& G& t
TCP 119=Nntp, Happy 99
$ {) ^$ H7 M, r* b, D# m! a5 p+ {1 E p1 s K7 t
TCP 121=JammerKiller, Bo jammerkillah 6 W- Y2 u& t' A) W T* L
. ~. r0 P2 q9 Q: W //TCP 137=NetBios-NS
+ h4 g" B- W! c8 x. y- I* T- l1 Z d6 X' n! [3 s" E( K
//TCP 138=NetBios-DGN " f, R. q" o* E# C( l; u" B6 ]
4 k% o( A+ K& B& }! A: | //TCP 139=NetBios-SSN
6 m7 [& N$ F* ], e9 `2 P' A- a, g
% o& Y7 t* Z7 T D TCP 143=IMAP
% P. j# d0 B& v8 M% ~/ q7 K Z
( u/ F, v; K- P( `( m6 u TCP 161=Snmp + C8 ^8 J6 a2 O6 C* g2 Q$ o* q/ w
' t$ G- ~7 l6 Q3 J! F% C, v TCP 162=Snmp-Trap ' {: d/ q5 z# `+ M1 p
1 n$ N4 G, W4 G; [4 Z; \
TCP 194=Irc , P$ |5 s% a& M
( e' |; [* B J6 R; ]% ~; K) O" ` TCP 421=TCP Wrappers
8 B' h5 U; m# z7 l
1 R, E* O. O0 T2 P; X3 H TCP 456=Hackers paradise
, x2 G0 r: E$ n( d& Z/ M6 L8 C2 ]6 U" M, C2 @
TCP 531=Rasmin 8 t, r2 z# I# _4 E* G4 I$ @
2 ]2 l" M. [) [9 v5 M6 b
TCP 555=Ini-Killer, Phase Zero, Stealth Spy 3 U- L: f, _8 Z: j$ T7 ]' S x
# H, |/ {4 J( A5 Q4 |' \$ c: ?
TCP 666=Attack FTP, Satanz Backdoor
; a0 ]& t S( H- _
7 g! \) B; S/ G O) p TCP 808=RemoteControl 7 s% h/ N+ J1 ?& Q
. }. k9 p& a! o: i
TCP 911=Dark Shadow |
|