|
以下这些是我搜集的一些黑客软件的连接端口,有些朋友经常问我一些关于端口名称的问题,我在这里做一个列表,将端口与名称集中公布,这样,方便你来分析端口的安全性,如果我的列表不全,或者你有新发现,或者是我这里有错误,那么,请你一定要告诉我,大家一起把他完善了。
- i: b x* ~, {; o: P" \* x* u: j% {
以下数据仅作参考
- E/ n# y; G4 Q0 e) P- `& K
p- P+ g1 N9 U# K! E 协议 端口=黑客程序
6 @7 e# U" ?6 q4 Y% Y" c y! n# L8 V/ W
TCP 7=Echo ( s( Z: m) Q4 L) g% m/ S
: I# ^6 y7 ^7 q" N# N0 v0 S, g
TCP 20=FTP Data
1 [' [" E# K% O) @7 k% A/ `! e+ i' ^. w6 G, W& U
TCP 21=Back Construction, Blade Runner, Doly Trojan, Fore, FTP trojan, Invisible FTP, Larva, WebEx, WinCrash
4 e: t! D( }5 R( x, D5 K7 B( A" E4 {' c
TCP 23=Telnet, Tiny Telnet Server (= TTS) ( a# J/ Z! Q1 d, e2 d) v% S/ s
' p% ?7 b. ]0 O+ ~4 Y) H" p* U1 a7 Y
TCP 25=SMTP, Ajan, Antigen, Email Password Sender, Happy 99, Kuang2, ProMail trojan, Shtrilitz, Stealth, Tapiras, Terminator, WinPC, WinSpy 2 S. u0 q5 G. o9 u$ b8 m7 K9 X
7 |2 j! [! u; o# P! k5 `
TCP 31=Agent 31, Hackers Paradise, Masters Paradise ! K7 x' w1 P" N L
# c2 `8 d- x, X TCP 41=DeepThroat
' F) P8 k0 J3 p2 E) Z# d) ]3 @
' x8 m# J, b/ n. \ TCP 43=WHOIS ) Y T4 K# O3 w* |, Z2 P8 j% z
& l' f: N: }; m5 q TCP 53=DNS,Bonk (DOS Exploit) 5 z, G& l {6 d
J- C* g8 {# k TCP 59=DMSetup 3 Q" `6 U1 L' J' C
% P, l- B6 P2 S J7 Z TCP 70=Gopher
. ^; |( U9 _* V9 u; C+ Z0 j
6 t7 y4 Z. y* | TCP 79=Firehotcker, Finger
7 O- R, i% o4 E- i& [9 s) |7 h) p# Z" u/ Z$ S4 I' u
TCP 80=Http服务器, Executor, RingZero - O/ J: W$ w5 K# w8 G" U# ?
$ I K% j2 g, F+ @" S
TCP 99=Hidden Port 6 z# |/ R! H9 u
3 Z) r9 A$ ~' R' n2 N4 G5 ~8 ?: a
TCP 110=Pop3服务器, ProMail
% r, Z7 z$ J& k1 o$ c0 W0 E4 T5 L6 T/ o
TCP 113=Kazimas, Auther Idnet
/ g1 I0 [' _( Y4 Z5 G/ M+ } q d: J/ q( c( n, c! [
TCP 119=Nntp, Happy 99 4 V" S" M5 I7 Y
$ T4 i: o9 ?& w' | TCP 121=JammerKiller, Bo jammerkillah
' C; r) a. z% L
9 F# K: d, Z N% p$ `; B. f //TCP 137=NetBios-NS $ f4 f2 E _) t4 x- y+ f0 ?2 w
! N, e5 H- C& W4 t8 V9 M- ` //TCP 138=NetBios-DGN
7 S/ s# C. l$ o* q3 c
: f% E M( [1 p) _ //TCP 139=NetBios-SSN
$ A8 V% H% P' @/ i2 L
: o: f5 m1 @' ?4 f: ?# i' t: L TCP 143=IMAP
( B8 M/ ~( Q: ?+ G# O* y& X! S" r6 q
TCP 161=Snmp
8 ]6 C4 S! W' ?6 O% N% |; j0 [6 n: C# M* [! }6 C0 n- V, {7 T
TCP 162=Snmp-Trap ; H" n) Y7 C4 o% M$ y4 h j
8 o! A( ~2 q% S5 E* Y% d: Y
TCP 194=Irc 0 l4 t7 S3 s+ W# L
* `2 A9 y' H- a1 I! [+ s# D% y TCP 421=TCP Wrappers
7 s1 W+ U& I O. d# {, a
3 A% O' v i8 N3 ~ TCP 456=Hackers paradise 3 K4 y, r" c- m0 i& v
7 Y6 t- c6 ` m s
TCP 531=Rasmin " }: l3 C8 {% U0 h
4 h, q! O" F9 Q ~- }0 q9 m! ^& B
TCP 555=Ini-Killer, Phase Zero, Stealth Spy
' D3 D! q6 ^) r& Q
6 \6 n% Q% B! U/ i TCP 666=Attack FTP, Satanz Backdoor
4 e6 c( Q5 T3 `3 @1 Z; }
1 E1 ~! j6 N$ R7 F: [ TCP 808=RemoteControl ) Y& M% @5 A; e& ~: @. `
- @* d3 U/ [# o( W5 T' f) v1 M TCP 911=Dark Shadow |
|