什么是动态端⼝(DynamicPorts)?动态端⼝的范围是多少?
动态端⼝不固定分配某种服务⽽动态分配的端⼝,动态分配是指当⼀个系统进程或应⽤程序进程需要⽹络通信时,它向主机申请⼀个端⼝,主机从可⽤的端⼝号中分配⼀个供它使⽤。当这个进程关闭时,同时也就释放了所占⽤的端⼝号。
动态端⼝的范围是从1024到65535。
计算机端⼝可分为3⼤类:
1) 公认端⼝(Well Known Ports):从0到1023,它们紧密绑定于⼀些服务。通常这些端⼝的通讯明确表明了某种服务的协议。例如:80端⼝实际上总是HTTP通讯。
2) 注册端⼝(Registered Ports):从1024到49151。它们松散地绑定于⼀些服务。也就是说有许多服务绑定于这些端⼝,这些端⼝同样⽤于许多其它⽬的。例如:许多系统处理动态端⼝从1024左右开始。
3) 动态和/或私有端⼝(Dynamic and/or Private Ports):从49152到65535。理论上,不应为服务分配这些端⼝。实际上,机器通常从1024起分配动态端⼝。但也有例外:SUN的RPC端⼝从32768开始。
(1)1~1024是规定好的端⼝号,不可⾃定义。
21端⼝:FTP ⽂件传输服务
22端⼝:SSH 远程连接服务
23端⼝:TELNET 终端仿真服务
25端⼝:SMTP 简单邮件传输服务
53端⼝:DNS 域名解析服务
80端⼝:HTTP 超⽂本传输服务
TCP 135=微软DCE RPC end-point mapper服务
TCP 137=微软Netbios Name服务(⽹上邻居传输⽂件使⽤)
TCP 138=微软Netbios Name服务(⽹上邻居传输⽂件使⽤)
TCP 139=微软Netbios Name服务(⽤于⽂件及打印机共享)
443端⼝:HTTPS 加密的超⽂本传输服务
TCP 110=电⼦邮件(Pop3),ProMail
(2)1025~65535的端⼝被称为动态端⼝,可⽤来建⽴与其它主机的会话,也可由⽤户⾃定义⽤途。
fiddler:8888
MySQL:3306
SqlServer:1433
Oracle :1521
远程桌⾯:3389
、///////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////、
其他端⼝资料查询
保留端⼝号
Unix系统有保留端⼝号的概念。只有具有超级⽤户特权的进程才允许给它⾃⼰分配⼀个保留端⼝号。
这些端⼝号介于1~1023之间,⼀些应⽤程序(如有名的Rlogin,26.2节)将它作为客户与服务器之间⾝份认证的⼀部分。
知名端⼝号
//注: 由于⼀些应⽤软件占⽤了部分端⼝, 因此此⽂件中的部分端⼝被注释掉了(注释字符为: //)
TCP 1=TCP Port Service Multiplexer
TCP 2=Death
TCP 5=Remote Job Entry,yoyo
TCP 16=Skun
TCP 17=Skun
TCP 18=消息传输协议,skun
TCP 19=Skun
eval是做什么的 TCP 20=FTP Data,Amanda
TCP 21=⽂件传输,Back Construction,Blade Runner,Doly Trojan,Fore,FTP trojan,Invisible FTP,Larva, WebEx,WinCrash TCP 22=远程登录协议
TCP 23=远程登录(Telnet),Tiny Telnet Server (= TTS)
TCP 25=电⼦邮件(SMTP),Ajan,Antigen,Email Password Sender,Happy 99,Kuang2,ProMail
trojan,Shtrilitz,Stealth,Tapiras,Terminator,WinPC,WinSpy,Haebu Coceda
TCP 27=Assasin
TCP 28=Amanda
TCP 29=MSG ICP
TCP 30=Agent 40421
TCP 31=Agent 31,Hackers Paradise,Masters Paradise,Agent 40421
TCP 37=Time,ADM worm
TCP 39=SubSARI
TCP 41=DeepThroat,Foreplay
TCP 42=Host Name Server
TCP 43=WHOIS
TCP 44=Arctic
TCP 48=DRAT
TCP 49=主机登录协议
TCP 50=DRAT
TCP 51=IMP Logical Address Maintenance,Fuck Lamers Backdoor
TCP 52=MuSka52,Skun
TCP 53=DNS,Bonk (DOS Exploit)
TCP 54=MuSka52
TCP 58=DMSetup
TCP 59=DMSetup
TCP 63=whois++
TCP 64=Communications Integrator
TCP 65=TACACS-Database Service
TCP 66=Oracle SQL*NET,AL-Bareki
TCP 67=Bootstrap Protocol Server
TCP 68=Bootstrap Protocol Client
TCP 69=W32.Evala.Worm,BackGate Kit,Nimda,Pasana,Storm,Storm worm,Theef,Worm.Cycle.a
TCP 70=Gopher服务,ADM worm
TCP 79=⽤户查询(Finger),Firehotcker,ADM worm
TCP 80=超⽂本服务器(Http),Executor,RingZero
TCP 81=Chubo,Worm.Bbeagle.q
TCP 82=Netsky-Z
TCP 88=Kerberos krb5服务
TCP 99=Hidden Port
TCP 102=消息传输代理
TCP 108=SNA⽹关访问服务器
TCP 109=Pop2
TCP 110=电⼦邮件(Pop3),ProMail
TCP 113=Kazimas, Auther Idnet
TCP 115=简单⽂件传输协议
TCP 118=SQL Services, Infector 1.4.2
TCP 119=新闻组传输协议(Newsgroup(Nntp)), Happy 99
TCP 121=JammerKiller, Bo jammerkillah
TCP 123=⽹络时间协议(NTP),Net Controller
TCP 129=Password Generator Protocol
TCP 133=Infector 1.x
TCP 135=微软DCE RPC end-point mapper服务
TCP 137=微软Netbios Name服务(⽹上邻居传输⽂件使⽤)
TCP 138=微软Netbios Name服务(⽹上邻居传输⽂件使⽤)
TCP 139=微软Netbios Name服务(⽤于⽂件及打印机共享)
TCP 142=NetTaxi
TCP 143=IMAP
TCP 146=FC Infector,Infector
TCP 150=NetBIOS Session Service
TCP 156=SQL服务器
TCP 177=X Display管理控制协议
TCP 179=Border⽹关协议(BGP)
TCP 190=⽹关访问控制协议(GACP)
TCP 194=Irc
TCP 197=⽬录定位服务(DLS)
TCP 256=Nirvana
TCP 315=The Invasor
TCP 371=ClearCase版本管理软件
TCP 389=Lightweight Directory Access Protocol (LDAP)
TCP 396=Novell Netware over IP
TCP 420=Breach
TCP 421=TCP Wrappers
TCP 443=安全服务
TCP 444=Simple Network Paging Protocol(SNPP)
TCP 445=Microsoft-DS
TCP 455=Fatal Connections
TCP 456=Hackers paradise,FuseSpark
TCP 458=苹果公司QuickTime
TCP 513=Grlogin
TCP 514=RPC Backdoor
TCP 520=Rip
TCP 531=Rasmin,Net666
TCP 544=kerberos kshell
TCP 546=DHCP Client
TCP 547=DHCP Server
TCP 548=Macintosh⽂件服务
TCP 555=Ini-Killer,Phase Zero,Stealth Spy
TCP 569=MSN
TCP 605=SecretService
TCP 606=Noknok8
TCP 660=DeepThroat
TCP 661=Noknok8
TCP 666=Attack FTP,Satanz Backdoor,Back Construction,Dark Connection Inside 1.2 TCP 667=Noknok7.2
TCP 668=Noknok6
TCP 669=DP trojan
TCP 692=GayOL
TCP 707=Welchia,nachi
TCP 777=AIM Spy
TCP 808=RemoteControl,WinHole
TCP 815=Everyone Darling
TCP 901=Backdoor.Devil
TCP 911=Dark Shadow
TCP 993=IMAP
TCP 999=DeepThroat
TCP 1000=Der Spaeher
TCP 1001=Silencer,WebEx,Der Spaeher
TCP 1003=BackDoor
TCP 1010=Doly
TCP 1011=Doly
TCP 1012=Doly
TCP 1015=Doly
TCP 1016=Doly
TCP 1020=Vampire
TCP 1023=Worm.Sasser.e
TCP 1024=NetSpy.698(YAI)
TCP 1059=nimreg
//TCP 1025=NetSpy.698,Unused Windows Services Block
//TCP 1026=Unused Windows Services Block
//TCP 1027=Unused Windows Services Block
TCP 1028=应⽤层⽹关服务
//TCP 1029=Unused Windows Services Block
//TCP 1030=Unused Windows Services Block
//TCP 1033=Netspy
//TCP 1035=Multidropper
//TCP 1047=GateCrasher
//TCP 1050=MiniCommand
TCP 1058=nim
TCP 1069=Backdoor.TheefServer.202
TCP 1070=Voice,Psyber Stream Server,Streaming Audio Trojan
TCP 1079=ASPROVATalk
TCP 1080=Wingate,Worm.BugBear.B,Worm.Novarg.B
//TCP 1090=Xtreme, VDOLive
//TCP 1092=LoveGate
//TCP 1095=Rat
//TCP 1097=Rat
//TCP 1098=Rat
//TCP 1099=Rat
TCP 1109=Pop with Kerberos
TCP 1110=nfsd-keepalive
TCP 1111=Backdoor.AIMVision
TCP 1155=Network File Access
//TCP 1170=Psyber Stream Server,Streaming Audio trojan,Voice
//TCP 1200=NoBackO
//TCP 1201=NoBackO
//TCP 1207=Softwar
//TCP 1212=Nirvana,Visul Killer
//TCP 1234=Ultors
//TCP 1243=BackDoor-G, SubSeven, SubSeven Apocalypse
//TCP 1245=VooDoo Doll
//TCP 1269=Mavericks Matrix
TCP 1270=Microsoft Operations Manager
//TCP 1313=Nirvana
//TCP 1349=BioNet
TCP 1352=Lotus Notes
TCP 1433=Microsoft SQL Server
TCP 1434=Microsoft SQL Monitor
//TCP 1441=Remote Storm
//TCP 1492=FTP99CMP(BackOriffice.FTP)
TCP 1503=NetMeeting T.120
TCP 1512=Microsoft Windows Internet Name Service
//TCP 1509=Psyber Streaming Server
TCP 1570=Orbix Daemon
//TCP 1600=Shivka-Burka
//TCP 1703=Exloiter 1.1
TCP 1720=NetMeeting H.233 call Setup
TCP 1731=NetMeeting⾳频调⽤控制
TCP 1745=ISA Server proxy autoconfig, Remote Winsock
TCP 1801=Microsoft Message Queue
//TCP 1807=SpySender
TCP 1906=Backdoor/Verify.b
TCP 1907=Backdoor/Verify.b
//TCP 1966=Fake FTP 2000
//TCP 1976=Custom port
//TCP 1981=Shockrave
TCP 1990=stun-p1 cisco STUN Priority 1 port
TCP 1990=stun-p1 cisco STUN Priority 1 port
TCP 1991=stun-p2 cisco STUN Priority 2 port
TCP 1992=stun-p3 cisco STUN Priority 3 port,ipsendmsg IPsendmsg TCP 1993=snmp-tcp-port cisco SNMP TCP port
TCP 1994=stun-port cisco serial tunnel port
TCP 1995=perf-port cisco perf port
TCP 1996=tr-rsrb-port cisco Remote SRB port
TCP 1997=gdp-port cisco Gateway Discovery Protocol
TCP 1998=x25-svc-port cisco X.25 service (XOT)
//TCP 1999=BackDoor, TransScout
//TCP 2000=Der Spaeher,INsane Network
TCP 2002=W32.Beagle.AX @mm
//TCP 2001=Transmisson scout
//TCP 2002=Transmisson scout
//TCP 2003=Transmisson scout
TCP 2011=cypress
TCP 2015=raid-cs
//TCP 2023=Ripper,Pass Ripper,Hack City Ripper Pro
TCP 2049=NFS
//TCP 2115=Bugs
//TCP 2121=Nirvana
//TCP 2140=Deep Throat, The Invasor
//TCP 2155=Nirvana
//TCP 2208=RuX
TCP 2234=DirectPlay
//TCP 2255=Illusion Mailer
//TCP 2283=HVL Rat5
//TCP 2300=PC Explorer
//TCP 2311=Studio54
TCP 2556=Worm.Bbeagle.q
//TCP 2565=Striker
//TCP 2583=WinCrash
//TCP 2600=Digital RootBeer
//TCP 2716=Prayer Trojan
TCP 2745=Worm.BBeagle.k
//TCP 2773=Backdoor,SubSeven
//TCP 2774=SubSeven2.1&2.2
//TCP 2801=Phineas Phucker
TCP 2967=SSC Agent
//TCP 2989=Rat
//TCP 3024=WinCrash trojan
TCP 3074=Microsoft Xbox game port
TCP 3127=Worm.Novarg
TCP 3128=RingZero,Worm.Novarg.B
//TCP 3129=Masters Paradise
TCP 3132=Microsoft Business Rule Engine Update Service
//TCP 3150=Deep Throat, The Invasor
TCP 3198=Worm.Novarg
//TCP 3210=SchoolBus
TCP 3268=Microsoft Global Catalog
TCP 3269=Microsoft Global Catalog with LDAP/SSL
TCP 3332=Worm.Cycle.a
TCP 3333=Prosiak
TCP 3535=Microsoft Class Server
TCP 3389=超级终端
//TCP 3456=Terror
//TCP 3459=Eclipse 2000
//TCP 3700=Portal of Doom
//TCP 3791=Eclypse
//TCP 3801=Eclypse
TCP 3847=Microsoft Firewall Control
TCP 3996=Portal of Doom,RemoteAnything
TCP 4000=腾讯QQ客户端
TCP 4060=Portal of Doom,RemoteAnything
TCP 4092=WinCrash
TCP 4242=VHM
TCP 4267=SubSeven2.1&2.2
TCP 4321=BoBo
TCP 4350=Net Device
TCP 4444=Prosiak,Swift remote
TCP 4500=Microsoft IPsec NAT-T, W32.HLLW.Tufas
TCP 4567=File Nail
TCP 4661=Backdoor/Surila.f
TCP 4590=ICQTrojan
TCP 4899=Remote Administrator服务器
TCP 4950=ICQTrojan
TCP 5000=WindowsXP服务器,Blazer 5,Bubbel,Back Door Setup,Sockets de Troie TCP 5001=Back Door Setup, Sockets de Troie
TCP 5002=cd00r,Shaft
TCP 5011=One of the Last Trojans (OOTLT)
TCP 5025=WM Remote KeyLogger
版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系QQ:729038198,我们将在24小时内删除。
发表评论