|
以下这些是我搜集的一些黑客软件的连接端口,有些朋友经常问我一些关于端口名称的问题,我在这里做一个列表,将端口与名称集中公布,这样,方便你来分析端口的安全性,如果我的列表不全,或者你有新发现,或者是我这里有错误,那么,请你一定要告诉我,大家一起把他完善了。 ' y: G+ r8 n) c9 S7 v: s$ u s/ H0 `
2 r& Z0 T3 _# J
以下数据仅作参考
6 j1 g7 P' I6 X- \; m2 s4 e4 ^! T* x" {/ S* p
协议 端口=黑客程序
' p: }7 y( C P& O6 w5 o/ M# R- A A+ J& B! G
TCP 7=Echo 5 M6 R/ f5 H& J% S5 p
* Z) ~6 _* D; }* J1 d) D( B* N, a
TCP 20=FTP Data
4 p; |: F' v% c" O* U* D* p+ J. c: W& H1 D. L
TCP 21=Back Construction, Blade Runner, Doly Trojan, Fore, FTP trojan, Invisible FTP, Larva, WebEx, WinCrash
( [' L9 N" O; `2 k" {& @1 p; |
4 m5 J- D8 {) ?9 l+ h TCP 23=Telnet, Tiny Telnet Server (= TTS) 2 K0 G) c/ }- R/ \3 X: s
2 \# P- @9 E$ j TCP 25=SMTP, Ajan, Antigen, Email Password Sender, Happy 99, Kuang2, ProMail trojan, Shtrilitz, Stealth, Tapiras, Terminator, WinPC, WinSpy + w, c: d( s6 [* n. `. n3 |& M
W- @" _0 `) K D( E
TCP 31=Agent 31, Hackers Paradise, Masters Paradise
; G$ u1 {; X/ D% ]; F
1 G' J% W! s! q% l9 E TCP 41=DeepThroat - H! |% L& p3 w# Y3 R
1 I6 I0 V; p2 y8 \0 U3 U
TCP 43=WHOIS
! ^; m, N, d, N- G8 d- q0 U; K( c+ N5 ^+ z3 O
TCP 53=DNS,Bonk (DOS Exploit) - S0 ^& ~6 C' F3 W& W. b
5 u! V3 c5 B+ \# y3 g ? TCP 59=DMSetup
! q3 C K2 g) p0 n) }
3 I3 F6 ~: `1 ]1 t TCP 70=Gopher
" C6 E# t4 ^2 y# A o7 C' ~% M# Q7 r/ `* Q9 V/ s/ w0 V1 O9 h+ o
TCP 79=Firehotcker, Finger 4 Q/ M N X, y- q' Z2 |
+ L0 y1 v9 D, z# w/ K9 V& Q TCP 80=Http服务器, Executor, RingZero
& D* K, K4 T4 J- O* ]
! |# v) u, x3 l( h3 p; [, T TCP 99=Hidden Port 3 s# h% q4 T2 L9 d* j. t: `
+ k: ^2 a7 |0 O4 l, a5 L; t3 B TCP 110=Pop3服务器, ProMail
1 o% _. c ^; S$ j% J S5 u! e2 {) b$ C" R9 D
TCP 113=Kazimas, Auther Idnet
# c3 b9 M2 Q, b6 G z7 r6 J) j; j( [8 m; j" `' o& t
TCP 119=Nntp, Happy 99 / i5 p' N; Y" p# C
" X8 z& K) O4 V" E! @% s
TCP 121=JammerKiller, Bo jammerkillah - @+ m6 m, U J3 T( Y, t3 |
1 X4 K }* D2 f D //TCP 137=NetBios-NS
/ ]& \; p' e6 s# F: D9 M- v+ L2 W( {
//TCP 138=NetBios-DGN
5 X4 y7 ^' g. ]; J& M1 |. e2 F* `" z+ V* L/ [/ C' }
//TCP 139=NetBios-SSN 6 s0 r% [$ Q4 z3 s8 s# c
( t1 M. r2 W: u- z u
TCP 143=IMAP " p$ H! K7 A# `9 P( i% m( g
6 g/ A5 N0 l9 Z. V TCP 161=Snmp
+ N' Z& T1 O+ h. J2 M8 D& I+ t/ o( d6 p4 O
TCP 162=Snmp-Trap
! C& o e5 m7 [7 _
1 h, A, r! e$ ^1 q/ d! H% ? TCP 194=Irc 6 t: f6 X2 c k" b$ E2 r
' B/ Z: p- n& W6 c9 P% a6 M TCP 421=TCP Wrappers
1 v9 z; X# r5 H* k) ?9 E3 {4 g/ c
* A. F w$ Z1 i4 {6 b0 f: O TCP 456=Hackers paradise & o' I/ a3 O0 W5 O, ]
+ F5 d/ L0 d. v TCP 531=Rasmin % b" a9 f8 f$ y, f3 B1 k
0 J' g4 `- j" e" D9 c) [5 b/ C
TCP 555=Ini-Killer, Phase Zero, Stealth Spy 3 B& ~2 Q" m* y5 d* }1 t
' B6 z% u' [& X" [1 K! F
TCP 666=Attack FTP, Satanz Backdoor ( L7 `; e1 S/ M. e4 I
& t% z5 |) c J: R% f8 r) |- ^ TCP 808=RemoteControl
6 ?6 m# D2 t) H7 D( o8 e3 H0 O$ r
TCP 911=Dark Shadow |
|