The Windows port can be thought of as the gateway to communication between the computer and the outside world. A logical port generally refers to a port in the TCP/IP protocol. The port number ranges from 0 to 65535, such as port 80 for browsing web services, port 21 for FTP services, and so on. Today, Xiaobian compiled a detailed description of the Windows system port, as follows:
Port: 0
Service: Reserved
Description: Usually used to analyze the operating system . This method works because in some systems, 0” is an invalid port, and when you try to connect to it using the usual closed port, it will produce different results. A typical scan that uses an IP address of 0.0.0.0, sets the ACK bit and broadcasts it at the Ethernet layer.
Port: 1
Service: tcpmux
Description: This shows that someone is looking for a SGI Irix machine. Irix is the main provider of tcpmux, and tcpmux is turned on by default in this system. The Irix machine is released with several default password-free accounts, such as IP, GUEST UUCP, NUCCP, DEMOS, TUTOR, DIAG, OUTOFBOX, etc. Many administrators forget to delete these accounts after installation. So HACKER searches tcpmux on the INTERNET and uses these accounts.
Port: 7
Service: Echo
Description: Can see information sent to X.X.X.0 and X.X.X.255 when many people search for Fraggle amplifiers.
Port: 19
Service: Character Generator
Description: This is a service that only sends characters. The UDP version will respond to packets containing junk characters after receiving the UDP packet. When a TCP connection is made, a stream containing garbage characters is sent until the connection is closed. HACKER can use IP spoofing to launch DoS attacks. Forged UDP packets between two chargen servers. Similarly, the Fraggle DoS attack broadcasts a packet with a fake victim IP to this port on the destination address, and the victim is overloaded in response to the data.
Port: 21
Service: FTP
Description: The port opened by the FTP server for uploading and downloading. The most common attackers are used to find ways to open an anonymous FTP server. These servers have a readable and writable directory. Ports opened by Trojan Doly Trojan, Fore, Invisible FTP, WebEx, WinCrash, and Blade Runner.
Port: 22
Service: Ssh
Description: The TCP established by PcAnywhere and the connection to this port may be for ssh. This service has a number of vulnerabilities. If configured into a specific mode, many versions of the RSAREF library will have many vulnerabilities.
Port: 23
Service: Telnet
Description: Remote login, the intruder is searching for remote login UNIX services. In most cases this port is scanned to find the operating system on which the machine is running. There are other techniques that intruders can also find passwords. The Trojan Tiny Telnet Server opens this port.
Port: 25
Service: SMTP
Description: The port opened by the SMTP server to send mail. Intruders look for SMTP servers to pass their SPAM. The intruder's account is closed and they need to connect to a high-bandwidth E-mail server to pass simple messages to different addresses. Trojan Antigen, Email Password Sender, Haebu Coceda, Shtrilitz Stealth, WinPC, WinSpy all open this port.
Port: 31
Service: MSG Authentication
Description: Trojan Master Paradise, Hackers Paradise open this port. Previous12Next page Total 2 pages
We all know that the newly installed WinXP system is very fast to use, dont feel very card! However,
Recently, some users have used the XP system to install the application when the ms
Graphical introduction to how to install a key GHOST and common settings. First, the installation:
WinXP system contains a lot of drivers, users often update these drivers, we usually solve the drive
Windows operating system lite - Windows Thin PC
Drive the reloaded extra local connection 2? Three steps to get
Perfect explanation from the CD installation XP system installation steps
Found that the memory can not be read and written and the solution
The WindowStations window station that you didn't know
How can I enter Windows XP Safe Mode?
Fix the registry to solve the problem of the language bar disappearing
Why can't Windows XP with SP2 install IIS
WinXP system backup registry steps
WinXP Disk Defragmenter detects the method of Chkdsk in the volume of the method
Windows8 upgrade win10 after starting blue screen how to do
WIN8 "automatic repair" can not fix your computer solution
How to directly upgrade the win8 system to win10 system
How to add a print port under win7
How to delete System Volume information folder in Win7
Win10 Mobile Redstone version number is determined to be released for Build 11082 next year
How to write uppercase numbers from one to ten? How do you write the numbers from one to ten?
Quick preview version of Win10 for mirroring? Microsoft said