ImageVerifierCode 换一换
格式:DOCX , 页数:91 ,大小:32.87KB ,
资源ID:15975362      下载积分:1 金币
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.bingdoc.com/d-15975362.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(常见端口一览表docx.docx)为本站会员(b****7)主动上传,冰点文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知冰点文库(发送邮件至service@bingdoc.com或直接QQ联系客服),我们立即给予删除!

常见端口一览表docx.docx

1、常见端口一览表docx常见端口一览表常见端口列表TCP 端口TCP 1=TCP Port Service MultiplexerTCP2=DeathTCP5=RemoteJobEntry,yoyoTCP7=EchoTCP11=SkunTCP12=BomberTCP16=SkunTCP17=SkunTCP18= 消息传输协议 ,skunTCP19=SkunTCP20=FTP Data,AmandaTCP21= 文件传输 ,Back Construction,Blade Runner,DolyTrojan,Fore,FTPtrojan,InvisibleFTP,Larva,WebEx,WinCra

2、shTCP 22= 远程登录协议TCP 23= 远程登录 (Telnet),Tiny Telnet Server (= TTS)TCP 25= 电子邮件 (SMTP),Ajan,Antige n,Email Password Sender,Happy 99,Kua ng2,ProMail trojan,Shtrilitz,Stealth,Tapiras,Terminator,WinPC,WinSpy,Haebu CocedaTCP27=AssasinTCP28=AmandaTCP29=MSGICPTCP30=Agent40421TCP31=Agent31,Hackers Paradise,Ma

3、stersParadise,Agent40421TCP37=Time,ADMwormTCP39=SubSARITCP41=DeepThroat,ForeplayTCP42=HostNameServerTCP43=WHOISTCP44=ArcticTCP48=DRATTCP49= 主机登录协议TCP50=DRATTCP51=IMPLogicalAddress Maintenance,Fuck Lamers BackdoorTCP52=MuSka52,SkunTCP53=DNS,Bonk (DOSExploit)TCP54=MuSka52TCP58=DMSetupTCP59=DMSetupTCP6

4、3=whois+TCP64=CommunicationsIntegratorTCP 65=TACACS-Database Service TCP 66=Oracle SQL*NET,AL-Bareki TCP 67=Bootstrap Protocol Server TCP 68=Bootstrap Protocol Client TCP 69=W32.Evala.Worm,BackGateKit,Nimda,Pasana,Storm,Storm worm,Th eef,Worm.Cycle.aTCP 70=Gopher 服务 ,ADM wormTCP 79= 用户查询 (Finger),Fi

5、rehotcker,ADM wormTCP 80= 超文本服务器 (Http),Executor,RingZeroTCP 81=Chubo,Worm.Bbeagle.qTCP 82=Netsky-ZTCP88=Kerberoskrb5 服务TCP99=Hidden PortTCP102= 消息传输代理TCP108=SNA 网关访问服务器TCP109=Pop2TCP110= 电子邮件 (Pop3),ProMailTCP113=Kazimas,Auther IdnetTCP115= 简单文件传输协议TCP118=SQL Services,Infector1.4.2TCP119= 新闻组传输协议 (

6、Newsgroup(Nntp),Happy 99TCP121=JammerKiller,Bo jammerkillahTCP123= 网络时间协议 (NTP),NetControllerTCP129=PasswordGenerator ProtocolTCP133=Infector1.xTCP135= 微软 DCERPCend-pointmapper服务TCP137=微软NetbiosName服务(网上邻居传输文件使用TCP 138= 微软)NetbiosName服务(网上邻居传输文件使用微软)服务(用于文件及打印机共享 )TCP142=NetTaxiTCP143=IMAPTCP146=FC

7、Infector,InfectorTCP150=NetBIOSSession ServiceTCP156=SQL 服务器TCP161=SnmpTCP162=Snmp-TrapTCP170=A-TrojanTCP177=X Display管理控制协议TCP179=Border 网关协议 (BGP)TCP190= 网关访问控制协议 (GACP)TCP194=IrcTCP197= 目录定位服务 (DLS)TCP256=NirvanaTCP315=The InvasorTCP371=ClearCase版本管理软件TCP389=LightweightDirectoryAccess Protocol (L

8、DAP)TCP396=NovellNetwareoverIPTCP420=BreachTCP421=TCPWrappersTCP443= 安全服务TCP444=SimpleNetworkPaging Protocol(SNPP)TCP445=Microsoft-DSTCP455=FatalConnectionsTCP456=Hackersparadise,FuseSparkTCP458= 苹果公司 QuickTimeTCP513=GrloginTCP514=RPCBackdoorTCP520=RipTCP531=Rasmin,Net666TCP544=kerberoskshellTCP546=

9、DHCPClientTCP547=DHCPServerTCP548=Macintosh文件服务TCP555=Ini-Killer,PhaseZero,Stealth SpyTCP569=MSNTCP605=SecretServiceTCP606=Noknok8TCP660=DeepThroatTCP661=Noknok8TCP666=AttackFTP,Satanz Backdoor,BackConstruction,DarkConnection Inside 1.2TCP667=Noknok7.2TCP668=Noknok6TCP669=DP trojanTCP692=GayOLTCP707

10、=Welchia,nachiTCP777=AIMSpyTCP808=RemoteControl,WinHoleTCP815=Everyone DarlingTCP901=Backdoor.DevilTCP911=DarkShadowTCP990=ssl 加密TCP993=IMAPTCP999=DeepThroatTCP1000=Der SpaeherTCP1001=Silencer,WebEx,DerSpaeherTCP1003=BackDoorTCP1010=DolyTCP1011=DolyTCP1012=DolyTCP1015=DolyTCP1016=DolyTCP1020=Vampire

11、TCP1023=Worm.Sasser.eTCP1024=NetSpy.698(YAI)TCP1059=nimreg/TCP1025=NetSpy.698,UnusedWindows Services Block/TCP1026=UnusedWindowsServicesBlock/TCP1027=UnusedWindowsServicesBlock/TCP1028=UnusedWindowsServicesBlock/TCP1029=UnusedWindowsServicesBlock/TCP1030=UnusedWindowsServicesBlock/TCP1033=Netspy/TCP

12、1035=Multidropper/TCP1042=Bla/TCP1045=Rasmin/TCP1047=GateCrasher/TCP1050=MiniCommandTCP1069=Backdoor.TheefServer.202TCP1070=Voice,PsyberStream Server,StreamingAudio TrojanTCP1080=Wingate,Worm.BugBear.B,Worm.Novarg.B/TCP1090=Xtreme, VDOLive/TCP1092=LoveGate/TCP1095=Rat/TCP1097=Rat/TCP1098=Rat/TCP1099

13、=RatTCP1110=nfsd-keepaliveTCP1111=Backdoor.AIMVisionTCP1155=NetworkFileAccess/TCP1170=PsyberStream Server,StreamingAudio trojan,Voice/TCP1200=NoBackO/TCP1201=NoBackO/TCP1207=Softwar/TCP1212=Nirvana,VisulKiller/TCP1234=Ultors/TCP1243=BackDoor-G,SubSeven,SubSeven Apocalypse/TCP1245=VooDooDoll/TCP1269=

14、MavericksMatrix/TCP1313=Nirvana/TCP1349=BioNetTCP1433=MicrosoftSQL 服务/TCP1441=RemoteStorm/TCP1492=FTP99CMP(BackOriffice.FTP)TCP1503=NetMeetingT.120/TCP1509=PsyberStreamingServer/TCP1600=Shivka-Burka/TCP1703=Exloiter1.1TCP1720=NetMeetingH.233 call SetupTCP1731=NetMeeting音频调用控制/TCP1807=SpySender/TCP19

15、66=Fake FTP2000/TCP1976=Customport/TCP1981=ShockraveTCP1990=stun-p1ciscoSTUNPriority1 portTCP1990=stun-p1ciscoSTUNPriority1 portTCP1991=stun-p2ciscoSTUNPriority2 portTCP1992=stun-p3ciscoSTUNPriority3 port,ipsendmsgIPsendmsgTCP1993=snmp-tcp-portciscoSNMP TCP portTCP1994=stun-portciscoserialtunnel por

16、tTCP1995=perf-portciscoperfportTCP1996=tr-rsrb-portciscoRemoteSRBportTCP1997=gdp-portciscoGatewayDiscoveryProtocolTCP1998=x25-svc-portciscoX.25service(XOT)/TCP1999=BackDoor,TransScout/TCP2000=Der Spaeher,INsaneNetworkTCP2002=W32.Beagle.AXmm/TCP2001=Transmissonscout/TCP2002=Transmissonscout/TCP2003=T

17、ransmissonscout/TCP2004=Transmissonscout/TCP2005=TTransmissonscoutTCP2011=cypressTCP2015=raid-cs/TCP2023=Ripper,PassRipper,Hack CityRipper ProTCP 2049=NFS/TCP 2115=Bugs/TCP 2121=Nirvana/TCP 2140=Deep Throat, The Invasor/TCP2155=Nirvana/TCP2208=RuX/TCP2255=Illusion Mailer/TCP2283=HVLRat5/TCP2300=PCEx

18、plorer/TCP2311=Studio54TCP2556=Worm.Bbeagle.q/TCP2565=Striker/TCP2583=WinCrash/TCP2600=DigitalRootBeer/TCP2716=PrayerTrojanTCP2745=Worm.BBeagle.k/TCP2773=Backdoor,SubSeven/TCP2774=SubSeven2.1&2.2/TCP2801=PhineasPhucker/TCP2989=Rat/TCP3024=WinCrashtrojanTCP 3127=Worm.NovargTCP 3128=RingZero,Worm.Nova

19、rg.B/TCP3129=MastersParadise/TCP3150=DeepThroat, The InvasorTCP3198=Worm.Novarg/TCP3210=SchoolBusTCP3332=Worm.Cycle.aTCP3333=ProsiakTCP3389= 超级终端/TCP3456=Terror/TCP3459=Eclipse2000/TCP3700=PortalofDoom/TCP3791=Eclypse/TCP3801=EclypseTCP3996=PortalofDoom,RemoteAnythingTCP4000= 腾讯 QQ 客户端TCP4060=Portal

20、ofDoom,RemoteAnythingTCP4092=WinCrashTCP4242=VHMTCP4267=SubSeven2.1&2.2TCP4321=BoBoTCP4444=Prosiak,SwiftremoteTCP4500=W32.HLLW.TufasTCP4567=FileNailTCP4590=ICQTrojanTCP4899=RemoteAdministrator服务器TCP4950=ICQTrojanTCP5000=WindowsXP服务器 ,Blazer5,Bubbel,BackDoorSetup,Socketsde TroieTCP5001=BackDoorSetup,

21、Sockets de TroieTCP5002=cd00r,ShaftTCP5011=OneoftheLastTrojans(OOTLT)TCP 5025=WM Remote KeyLogger TCP 5031=Firehotcker,Metropolitan,NetMetroTCP 5032=MetropolitanTCP5190=ICQQueryTCP5321=FirehotckerTCP5333=BackageTrojanBox3TCP5343=WCratTCP5400=BladeRunner,BackConstruction1.2TCP5401=BladeRunner,BackCon

22、structionTCP5402=BladeRunner,BackConstructionTCP5471=WinCrashTCP5512=IllusionMailerTCP5521=IllusionMailerTCP5550=Xtcp,INsaneNetworkTCP5554=Worm.SasserTCP5555=ServeMeTCP5556=BOFacilTCP5557=BOFacilTCP5569=Robo-HackTCP5598=BackDoor2.03TCP5631=PCAnyWheredataTCP5632=PCAnyWhereTCP5637=PCCrasherTCP5638=PCCrasherTCP5698=BackDoorTCP5714=Wincrash3TCP5741=WinCrash3TCP5742=WinCrashTCP5760=PortmapRemoteRootLinux ExploitTCP5880=Y3KRATTCP5881=Y3KRATTCP5882=Y3KRATTCP5888=Y3KRAT

copyright@ 2008-2023 冰点文库 网站版权所有

经营许可证编号:鄂ICP备19020893号-2