Login
升级VIP 登录 注册 安全退出
当前位置: 首页 > word文档 > 其他文档 > 端口号--使用必备,端口号的使用

端口号--使用必备,端口号的使用

收藏

本作品内容为端口号--使用必备,格式为 doc ,大小 143872 KB ,页数为 18页

端口号--使用必备


('端口号端口概念在网络技术中,端口(Port)大致有两种意思:一是物理意义上的端口,比如,ADSLModem、集线器、交换机、路由器用于连接其他网络设备的接口,如RJ-45端口、SC端口等等。二是逻辑意义上的端口,一般是指TCP/IP协议中的端口,端口号的范围从0到65535,比如用于浏览网页服务的80端口,用于FTP服务的21端口等等。我们这里将要介绍的就是逻辑意义上的端口。[编辑本段]端口号那么TCP/IP协议中的端口指的是什么呢?如果把IP地址比作一间房子,端口就是出入这间房子的门。真正的房子只有几个门,但是一个IP地址的端口可以有65536个之多!端口是通过端口号来标记的,端口号只有整数,范围是从0到65535。端口有什么用呢?我们知道,一台拥有IP地址的主机可以提供许多服务,比如Web服务、FTP服务、SMTP服务等,这些服务完全可以通过1个IP地址来实现。那么,主机是怎样区分不同的网络服务呢?显然不能只靠IP地址,因为IP地址与网络服务的关系是一对多的关系。实际上是通过“IP地址+端口号”来区分不同的服务的。服务器一般都是通过知名端口号来识别的。例如,对于每个TCP/IP实现来说,FTP服务器的TCP端口号都是21,每个Telnet服务器的TCP端口号都是23,每个TFTP(简单文件传送协议)服务器的UDP端口号都是69。任何TCP/IP实现所提供的服务都用知名的1~1023之间的端口号。这些知名端口号由Internet号分配机构(InternetAssignedNumbersAuthority,IANA)来管理。到1992年为止,知名端口号介于1~255之间。256~1023之间的端口号通常都是由Unix系统占用,以提供一些特定的Unix服务—也就是说,提供一些只有Unix系统才有的、而其他操作系统可能不提供的服务。现在IANA管理1~1023之间所有的端口号。Internet扩展服务与Unix特定服务之间的一个差别就是Telnet和Rlogin。它们二者都允许通过计算机网络登录到其他主机上。Telnet是采用端口号为23的TCP/IP标准且几乎可以在所有操作系统上进行实现。相反,Rlogin最开始时只是为Unix系统设计的(尽管许多非Unix系统现在也提供该服务),因此在80年代初,它的有名端口号为513。客户端通常对它所使用的端口号并不关心,只需保证该端口号在本机上是唯一的就可以了。客户端口号又称作临时端口号(即存在时间很短暂)。这是因为它通常只是在用户运行该客户程序时才存在,而服务器则只要主机开着的,其服务就运行。大多数TCP/IP实现给临时端口分配1024~5000之间的端口号。大于5000的端口号是为其他服务器预留的(Internet上并不常用的服务)。我们可以在后面看见许多这样的给临时端口分配端口号的例子。Solaris2.2是一个很有名的例外。通常TCP和UDP的缺省临时端口号从32768开始。TCP与UDP对于端口号的使用规定TCP与UDP段结构中端口地址都是16比特,可以有在0---65535范围内的端口号。对于这65536个端口号有以下的使用规定:(1)端口号小于256的定义为常用端口,服务器一般都是通过常用端口号来识别的。任何TCP/IP实现所提供的服务都用1---1023之间的端口号,是由IANA来管理的;(2)客户端只需保证该端口号在本机上是惟一的就可以了。客户端口号因存在时间很短暂又称临时端口号;(3)大多数TCP/IP实现给临时端口号分配1024---5000之间的端口号。大于5000的端口号是为其他服务器预留的。[编辑本段]端口分类逻辑意义上的端口有多种分类标准,下面将介绍常见的按端口号分布的分类:(1)知名端口(Well-KnownPorts)知名端口即众所周知的端口号,范围从0到1023,这些端口号一般固定分配给一些服务。比如21端口分配给FTP(文件传输协议)服务,25端口分配给SMTP(简单邮件传输协议)服务,80端口分配给HTTP服务,135端口分配给RPC(远程过程调用)服务等等。网络服务是可以使用其他端口号的,如果不是默认的端口号则应该在地址栏上指定端口号,方法是在地址后面加上冒号“:”(半角),再加上端口号。比如使用“8080”作为WWW服务的端口,则需要在地址栏里输入“www.cce.com.cn:8080”。但是有些系统协议使用固定的端口号,它是不能被改变的,比如139端口专门用于NetBIOS与TCP/IP之间的通信,不能手动改变。(2)动态端口(DynamicPorts)动态端口的范围从1024到65535,这些端口号一般不固定分配给某个服务,也就是说许多服务都可以使用这些端口。只要运行的程序向系统提出访问网络的申请,那么系统就可以从这些端口号中分配一个供该程序使用。比如1024端口就是分配给第一个向系统发出申请的程序。在关闭程序进程后,就会释放所占用的端口号。不过,动态端口也常常被病毒木马程序所利用,如冰河默认连接端口是7626、WAY2.4是8011、Netspy3.0是7306、YAI病毒是1024等。(3)保留端口号Unix系统有保留端口号的概念。只有具有超级用户特权的进程才允许给它自己分配一个保留端口号。这些端口号介于1~1023之间,一些应用程序(如有名的Rlogin,26.2节)将它作为客户与服务器之间身份认证的一部分。知名端口号//注:由于一些应用软件占用了部分端口,因此此文件中的部分端口被注释掉了(注释字符为://)TCP1=TCPPortServiceMultiplexerTCP2=DeathTCP5=RemoteJobEntry,yoyoTCP7=EchoTCP11=SkunTCP12=BomberTCP16=SkunTCP17=SkunTCP18=消息传输协议,skunTCP19=SkunTCP20=FTPData,AmandaTCP21=文件传输,BackConstruction,BladeRunner,DolyTrojan,Fore,FTPtrojan,InvisibleFTP,Larva,WebEx,WinCrashTCP22=远程登录协议TCP23=远程登录(Telnet),TinyTelnetServer(=TTS)TCP25=电子邮件(SMTP),Ajan,Antigen,EmailPasswordSender,Happy99,Kuang2,ProMailtrojan,Shtrilitz,Stealth,Tapiras,Terminator,WinPC,WinSpy,HaebuCocedaTCP27=AssasinTCP28=AmandaTCP29=MSGICPTCP30=Agent40421TCP31=Agent31,HackersParadise,MastersParadise,Agent40421TCP37=Time,ADMwormTCP39=SubSARITCP41=DeepThroat,ForeplayTCP42=HostNameServerTCP43=WHOISTCP44=ArcticTCP48=DRATTCP49=主机登录协议TCP50=DRATTCP51=IMPLogicalAddressMaintenance,FuckLamersBackdoorTCP52=MuSka52,SkunTCP53=DNS,Bonk(DOSExploit)TCP54=MuSka52TCP58=DMSetupTCP59=DMSetupTCP63=whois++TCP64=CommunicationsIntegratorTCP65=TACACS-DatabaseServiceTCP66=OracleSQLNET,AL-BarekiTCP67=BootstrapProtocolServerTCP68=BootstrapProtocolClientTCP69=W32.Evala.Worm,BackGateKit,Nimda,Pasana,Storm,Stormworm,Theef,Worm.Cycle.aTCP70=Gopher服务,ADMwormTCP79=用户查询(Finger),Firehotcker,ADMwormTCP80=超文本服务器(Http),Executor,RingZeroTCP81=Chubo,Worm.Bbeagle.qTCP82=Netsky-ZTCP88=Kerberoskrb5服务TCP99=HiddenPortTCP102=消息传输代理TCP108=SNA网关访问服务器TCP109=Pop2TCP110=电子邮件(Pop3),ProMailTCP113=Kazimas,AutherIdnetTCP115=简单文件传输协议TCP118=SQLServices,Infector1.4.2TCP119=新闻组传输协议(Newsgroup(Nntp)),Happy99TCP121=JammerKiller,BojammerkillahTCP123=网络时间协议(NTP),NetControllerTCP129=PasswordGeneratorProtocolTCP133=Infector1.xTCP135=微软DCERPCend-pointmapper服务TCP137=微软NetbiosName服务(网上邻居传输文件使用)TCP138=微软NetbiosName服务(网上邻居传输文件使用)TCP139=微软NetbiosName服务(用于文件及打印机共享)TCP142=NetTaxiTCP143=IMAPTCP146=FCInfector,InfectorTCP150=NetBIOSSessionServiceTCP156=SQL服务器TCP161=SnmpTCP162=Snmp-TrapTCP170=A-TrojanTCP177=XDisplay管理控制协议TCP179=Border网关协议(BGP)TCP190=网关访问控制协议(GACP)TCP194=IrcTCP197=目录定位服务(DLS)TCP256=NirvanaTCP315=TheInvasorTCP371=ClearCase版本管理软件TCP389=LightweightDirectoryAccessProtocol(LDAP)TCP396=NovellNetwareoverIPTCP420=BreachTCP421=TCPWrappersTCP443=安全服务TCP444=SimpleNetworkPagingProtocol(SNPP)TCP445=Microsoft-DSTCP455=FatalConnectionsTCP456=Hackersparadise,FuseSparkTCP458=苹果公司QuickTimeTCP513=GrloginTCP514=RPCBackdoorTCP520=RipTCP531=Rasmin,Net666TCP544=kerberoskshellTCP546=DHCPClientTCP547=DHCPServerTCP548=Macintosh文件服务TCP555=Ini-Killer,PhaseZero,StealthSpyTCP569=MSNTCP605=SecretServiceTCP606=Noknok8TCP660=DeepThroatTCP661=Noknok8TCP666=AttackFTP,SatanzBackdoor,BackConstruction,DarkConnectionInside1.2TCP667=Noknok7.2TCP668=Noknok6TCP669=DPtrojanTCP692=GayOLTCP707=Welchia,nachiTCP777=AIMSpyTCP808=RemoteControl,WinHoleTCP815=EveryoneDarlingTCP901=Backdoor.DevilTCP911=DarkShadowTCP993=IMAPTCP999=DeepThroatTCP1000=DerSpaeherTCP1001=Silencer,WebEx,DerSpaeherTCP1003=BackDoorTCP1010=DolyTCP1011=DolyTCP1012=DolyTCP1015=DolyTCP1016=DolyTCP1020=VampireTCP1023=Worm.Sasser.eTCP1024=NetSpy.698(YAI)TCP1059=nimreg//TCP1025=NetSpy.698,UnusedWindowsServicesBlock//TCP1026=UnusedWindowsServicesBlock//TCP1027=UnusedWindowsServicesBlockTCP1028=应用层网关服务//TCP1029=UnusedWindowsServicesBlock//TCP1030=UnusedWindowsServicesBlock//TCP1033=Netspy//TCP1035=Multidropper//TCP1042=Bla//TCP1045=Rasmin//TCP1047=GateCrasher//TCP1050=MiniCommandTCP1058=nimTCP1069=Backdoor.TheefServer.202TCP1070=Voice,PsyberStreamServer,StreamingAudioTrojanTCP1079=ASPROVATalkTCP1080=Wingate,Worm.BugBear.B,Worm.Novarg.B//TCP1090=Xtreme,VDOLive//TCP1092=LoveGate//TCP1095=Rat//TCP1097=Rat//TCP1098=Rat//TCP1099=RatTCP1109=PopwithKerberosTCP1110=nfsd-keepaliveTCP1111=Backdoor.AIMVisionTCP1155=NetworkFileAccess//TCP1170=PsyberStreamServer,StreamingAudiotrojan,Voice//TCP1200=NoBackO//TCP1201=NoBackO//TCP1207=Softwar//TCP1212=Nirvana,VisulKiller//TCP1234=Ultors//TCP1243=BackDoor-G,SubSeven,SubSevenApocalypse//TCP1245=VooDooDoll//TCP1269=MavericksMatrixTCP1270=MicrosoftOperationsManager//TCP1313=Nirvana//TCP1349=BioNetTCP1352=LotusNotesTCP1433=MicrosoftSQLServerTCP1434=MicrosoftSQLMonitor//TCP1441=RemoteStorm//TCP1492=FTP99CMP(BackOriffice.FTP)TCP1503=NetMeetingT.120TCP1512=MicrosoftWindowsInternetNameService//TCP1509=PsyberStreamingServerTCP1570=OrbixDaemon//TCP1600=Shivka-Burka//TCP1703=Exloiter1.1TCP1720=NetMeetingH.233callSetupTCP1731=NetMeeting音频调用控制TCP1745=ISAServerproxyautoconfig,RemoteWinsockTCP1801=MicrosoftMessageQueue//TCP1807=SpySenderTCP1906=Backdoor/Verify.bTCP1907=Backdoor/Verify.b//TCP1966=FakeFTP2000//TCP1976=Customport//TCP1981=ShockraveTCP1990=stun-p1ciscoSTUNPriority1portTCP1990=stun-p1ciscoSTUNPriority1portTCP1991=stun-p2ciscoSTUNPriority2portTCP1992=stun-p3ciscoSTUNPriority3port,ipsendmsgIPsendmsgTCP1993=snmp-tcp-portciscoSNMPTCPportTCP1994=stun-portciscoserialtunnelportTCP1995=perf-portciscoperfportTCP1996=tr-rsrb-portciscoRemoteSRBportTCP1997=gdp-portciscoGatewayDiscoveryProtocolTCP1998=x25-svc-portciscoX.25service(XOT)//TCP1999=BackDoor,TransScout//TCP2000=DerSpaeher,INsaneNetworkTCP2002=W32.Beagle.AX@mm//TCP2001=Transmissonscout//TCP2002=Transmissonscout//TCP2003=Transmissonscout//TCP2004=Transmissonscout//TCP2005=TTransmissonscoutTCP2011=cypressTCP2015=raid-cs//TCP2023=Ripper,PassRipper,HackCityRipperProTCP2049=NFS//TCP2115=Bugs//TCP2121=Nirvana//TCP2140=DeepThroat,TheInvasor//TCP2155=Nirvana//TCP2208=RuXTCP2234=DirectPlay//TCP2255=IllusionMailer//TCP2283=HVLRat5//TCP2300=PCExplorer//TCP2311=Studio54TCP2556=Worm.Bbeagle.q//TCP2565=Striker//TCP2583=WinCrash//TCP2600=DigitalRootBeer//TCP2716=PrayerTrojanTCP2745=Worm.BBeagle.k//TCP2773=Backdoor,SubSeven//TCP2774=SubSeven2.1&2.2//TCP2801=PhineasPhuckerTCP2967=SSCAgent//TCP2989=Rat//TCP3024=WinCrashtrojanTCP3074=MicrosoftXboxgameportTCP3127=Worm.NovargTCP3128=RingZero,Worm.Novarg.B//TCP3129=MastersParadiseTCP3132=MicrosoftBusinessRuleEngineUpdateService//TCP3150=DeepThroat,TheInvasorTCP3198=Worm.Novarg//TCP3210=SchoolBusTCP3268=MicrosoftGlobalCatalogTCP3269=MicrosoftGlobalCatalogwithLDAP/SSLTCP3332=Worm.Cycle.aTCP3333=ProsiakTCP3535=MicrosoftClassServerTCP3389=超级终端//TCP3456=Terror//TCP3459=Eclipse2000//TCP3700=PortalofDoom//TCP3791=Eclypse//TCP3801=EclypseTCP3847=MicrosoftFirewallControlTCP3996=PortalofDoom,RemoteAnythingTCP4000=腾讯QQ客户端TCP4060=PortalofDoom,RemoteAnythingTCP4092=WinCrashTCP4242=VHMTCP4267=SubSeven2.1&2.2TCP4321=BoBoTCP4350=NetDeviceTCP4444=Prosiak,SwiftremoteTCP4500=MicrosoftIPsecNAT-T,W32.HLLW.TufasTCP4567=FileNailTCP4661=Backdoor/Surila.fTCP4590=ICQTrojanTCP4899=RemoteAdministrator服务器TCP4950=ICQTrojanTCP5000=WindowsXP服务器,Blazer5,Bubbel,BackDoorSetup,SocketsdeTroieTCP5001=BackDoorSetup,SocketsdeTroieTCP5002=cd00r,ShaftTCP5011=OneoftheLastTrojans(OOTLT)TCP5025=WMRemoteKeyLoggerTCP5031=Firehotcker,Metropolitan,NetMetroTCP5032=MetropolitanTCP5190=ICQQueryTCP5321=FirehotckerTCP5333=BackageTrojanBox3TCP5343=WCratTCP5400=BladeRunner,BackConstruction1.2TCP5401=BladeRunner,BackConstructionTCP5402=BladeRunner,BackConstructionTCP5471=WinCrashTCP5512=IllusionMailerTCP5521=IllusionMailerTCP5550=Xtcp,INsaneNetworkTCP5554=Worm.SasserTCP5555=ServeMeTCP5556=BOFacilTCP5557=BOFacilTCP5569=Robo-HackTCP5598=BackDoor2.03TCP5631=PCAnyWheredataTCP5632=PCAnyWhereTCP5637=PCCrasherTCP5638=PCCrasherTCP5678=RemoteReplicationAgentConnectionTCP5679=DirectCableConnectManagerTCP5698=BackDoorTCP5714=Wincrash3TCP5720=MicrosoftLicensingTCP5741=WinCrash3TCP5742=WinCrashTCP5760=PortmapRemoteRootLinuxExploitTCP5880=Y3KRATTCP5881=Y3KRATTCP5882=Y3KRATTCP5888=Y3KRATTCP5889=Y3KRATTCP5900=WinVncTCP6000=Backdoor.ABTCP6006=Noknok8TCP6073=DirectPlay8TCP6129=DamewareNtUtilities服务器TCP6272=SecretServiceTCP6267=广外女生TCP6400=Backdoor.AB,TheThingTCP6500=Devil1.03TCP6661=TemanTCP6666=TCPshell.cTCP6667=NTRemoteControl,Wise播放器接收端口TCP6668=WiseVideo广播端口TCP6669=VampyreTCP6670=DeepThroat,iPhoneTCP6671=DeepThroat3.0TCP6711=SubSevenTCP6712=SubSeven1.xTCP6713=SubSevenTCP6723=MstreamTCP6767=NTRemoteControlTCP6771=DeepThroatTCP6776=BackDoor-G,SubSeven,2000CracksTCP6777=Worm.BBeagleTCP6789=DolyTrojanTCP6838=MstreamTCP6883=DeltaSourceTCP6912=ShitHeepTCP6939=IndoctrinationTCP6969=GateCrasher,Priority,IRC3TCP6970=RealAudio,GateCrasherTCP7000=RemoteGrab,NetMonitor,SubSeven1.xTCP7001=Freak88TCP7201=NetMonitorTCP7215=BackDoor-G,SubSevenTCP7001=Freak88,Freak2kTCP7300=NetMonitorTCP7301=NetMonitorTCP7306=NetMonitor,NetSpy1.0TCP7307=NetMonitor,ProcSpyTCP7308=NetMonitor,XSpyTCP7323=Sygate服务器端TCP7424=HostControlTCP7511=聪明基因TCP7597=QazTCP7609=SnidX2TCP7626=冰河TCP7777=TheThingTCP7789=BackDoorSetup,ICQKillerTCP7983=MstreamTCP8000=腾讯OICQ服务器端,XDMATCP8010=Wingate,LogfileTCP8011=WAY2.4TCP8080=WWW代理,RingZero,Chubo,Worm.Novarg.BTCP8102=网络神偷TCP8181=W32.Erkez.D@mmTCP8520=W32.Socay.WormTCP8594=I-Worm/Bozori.aTCP8787=BackOfrice2000TCP8888=WinvncTCP8897=HackOffice,ArmageddonTCP8989=ReconTCP9000=NetministratorTCP9325=MstreamTCP9400=InCommand1.0TCP9401=InCommand1.0TCP9402=InCommand1.0TCP9535=RemoteManServerTCP9872=PortalofDoomTCP9873=PortalofDoomTCP9874=PortalofDoomTCP9875=PortalofDoomTCP9876=CyberAttackerTCP9878=TransScoutTCP9989=Ini-KillerTCP9898=Worm.Win32.Dabber.aTCP9999=PrayerTrojanTCP10067=PortalofDoomTCP10080=Worm.Novarg.BTCP10084=SyphillisTCP10085=SyphillisTCP10086=SyphillisTCP10101=BrainSpyTCP10167=PortalOfDoomTCP10168=Worm.Supnot.78858.c,Worm.LovGate.TTCP10520=AcidShiversTCP10607=ComatrojanTCP10666=AmbushTCP11000=SennaSpyTCP11050=HostControlTCP11051=HostControlTCP11223=Progenic,Hack\'99KeyLoggerTCP11320=IMIPChannelsPortTCP11831=TROJ_LATINUS.SVRTCP12076=Gjamer,MSH.104bTCP12223=Hack\'99KeyLoggerTCP12345=GabanBus,NetBus1.6/1.7,PieBillGates,X-billTCP12346=GabanBus,NetBus1.6/1.7,X-billTCP12349=BioNetTCP12361=Whack-a-moleTCP12362=Whack-a-moleTCP12363=Whack-a-moleTCP12378=W32/Gibe@MMTCP12456=NetBusTCP12623=DUNControlTCP12624=ButtmanTCP12631=WhackJob,WhackJob.NB1.7TCP12701=Eclipse2000TCP12754=MstreamTCP13000=SennaSpyTCP13010=HackerBrazilTCP13013=PsychwardTCP13223=TribalVoice的聊天程序PowWowTCP13700=Kuang2TheVirusTCP14456=SoleroTCP14500=PCInvaderTCP14501=PCInvaderTCP14502=PCInvaderTCP14503=PCInvaderTCP15000=NetDaemon1.0TCP15092=HostControlTCP15104=MstreamTCP16484=MosuckerTCP16660=Stacheldraht(DDoS)TCP16772=ICQRevengeTCP16959=PriorityTCP16969=PriorityTCP17027=提供广告服务的Conducent"adbot"共享软件TCP17166=MosaicTCP17300=Kuang2TheVirusTCP17490=CrazyNetTCP17500=CrazyNetTCP17569=Infector1.4.x+1.6.xTCP17777=NephronTCP18753=Shaft(DDoS)TCP19191=蓝色火焰TCP19864=ICQRevengeTCP20000=MillenniumII(GrilFriend)TCP20001=MillenniumII(GrilFriend)TCP20002=AcidkoRTCP20034=NetBus2ProTCP20168=LovgateTCP20203=Logged,ChupacabraTCP20331=BlaTCP20432=Shaft(DDoS)TCP20808=Worm.LovGate.v.QQTCP21335=TribalFloodNetwork,TrinooTCP21544=Schwindler1.82,GirlFriendTCP21554=Schwindler1.82,GirlFriend,Exloiter1.0.1.2TCP22222=Prosiak,RuXUploader2.0TCP22784=Backdoor.IntruzzoTCP23432=Asylum0.1.3TCP23444=网络公牛TCP23456=EvilFTP,UglyFTP,WhackJobTCP23476=DonaldDickTCP23477=DonaldDickTCP23777=INetSpyTCP26274=DeltaTCP26681=SpyVoiceTCP27374=SubSeven2.0+,Backdoor.BasteTCP27444=TribalFloodNetwork,TrinooTCP27665=TribalFloodNetwork,TrinooTCP29431=HackAttackTCP29432=HackAttackTCP29104=HostControlTCP29559=TROJ_LATINUS.SVRTCP29891=TheUnexplainedTCP30001=Terr0r32TCP30003=Death,LamersDeathTCP30029=AOLtrojanTCP30100=NetSphere1.27a,NetSphere1.31TCP30101=NetSphere1.31,NetSphere1.27aTCP30102=NetSphere1.27a,NetSphere1.31TCP30103=NetSphere1.31TCP30303=SocketsdeTroieTCP30722=W32.Esbot.ATCP30947=IntruseTCP30999=Kuang2TCP31336=BoWhackTCP31337=BaronNight,BOclient,BO2,BoFacil,BackFire,BackOrifice,DeepBO,Freak2k,NetSpyTCP31338=NetSpy,BackOrifice,DeepBOTCP31339=NetSpyDKTCP31554=SchwindlerTCP31666=BOWhackTCP31778=HackAttackTCP31785=HackAttackTCP31787=HackAttackTCP31789=HackAttack更新时间:2007年8月6日TCP31791=HackAttackTCP31792=HackAttackTCP32100=PeanutBrittleTCP32418=AcidBatteryTCP33333=Prosiak,Blakharaz1.0TCP33577=SonOfPsychwardTCP33777=SonOfPsychwardTCP33911=Spirit2001aTCP34324=BigGluck,TN,TinyTelnetServerTCP34555=Trin00(Windows)(DDoS)TCP35555=Trin00(Windows)(DDoS)TCP36794=Worm.Bugbear-ATCP37651=YATTCP40412=TheSpyTCP40421=Agent40421,MastersParadise.96TCP40422=MastersParadiseTCP40423=MastersParadise.97TCP40425=MastersParadiseTCP40426=MastersParadise3.xTCP41666=RemoteBootTCP43210=Schoolbus1.6/2.0TCP44444=DeltaSourceTCP44445=HappypigTCP45576=未知代理TCP47252=ProsiakTCP47262=DeltaTCP47624=DirectPlayServerTCP47878=BirdSpy2TCP49301=OnlineKeyloggerTCP50505=SocketsdeTroieTCP50766=Fore,SchwindlerTCP51966=CafeIniTCP53001=RemoteWindowsShutdownTCP53217=AcidBattery2000TCP54283=BackDoor-G,Sub7TCP54320=BackOrifice2000,SheepTCP54321=SchoolBus.69-1.11,Sheep,BO2KTCP57341=NetRaiderTCP58008=BackDoor.TronTCP58009=BackDoor.TronTCP58339=ButtFunnelTCP59211=BackDoor.DuckToyTCP60000=DeepThroatTCP60068=Xzip6000068TCP60411=ConnectionTCP60606=TROJ_BCKDOR.G2.ATCP61466=TelecommandoTCP61603=Bunker-killTCP63485=Bunker-killTCP65000=Devil,DDoSTCP65432=Th3tr41t0r,TheTraitorTCP65530=TROJ_WINMITE.10TCP65535=RC,AdoreWorm/LinuxTCP69123=ShitHeepTCP88798=Armageddon,HackOfficeUDP1=SocketsdesTroieUDP9=ChargenUDP19=ChargenUDP69=PasanaUDP80=PenroxUDP371=ClearCase版本管理软件UDP445=公共Internet文件系统(CIFS)UDP500=Internet密钥交换UDP1025=Maverick\'sMatrix1.2-2.0UDP1026=RemoteExplorer2000UDP1027=HP服务,UC聊天软件,Trojan.Huigezi.eUDP1028=应用层网关服务,KiLo,SubSARIUDP1029=SubSARIUDP1031=XotUDP1032=Akosch4UDP1104=RexxRaveUDP1111=DaodanUDP1116=LurkerUDP1122=Last2000,SingularityUDP1183=Cyn,SweetHeartUDP1200=NoBackOUDP1201=NoBackOUDP1342=BLAtrojanUDP1344=PtakksUDP1349=BOdllUDP1512=MicrosoftWindowsInternetNameServiceUDP1561=MuSka52UDP1772=NetControleUDP1801=MicrosoftMessageQueueUDP1978=SlapperUDP1985=BlackDiverUDP2000=A-trojan,Fear,Force,GOTHICIntruder,Last2000,Real2000UDP2001=ScalperUDP2002=SlapperUDP2015=raid-csUDP2018=rellpackUDP2130=MiniBackLashUDP2140=DeepThroat,Foreplay,TheInvasorUDP2222=SweetHeart,Way,Backdoor/Mifeng.tUDP2234=DirectPlayUDP2339=VoiceSpyUDP2702=BlackDiverUDP2989=RATUDP3074=MicrosoftXboxgameportUDP3132=MicrosoftBusinessRuleEngineUpdateServiceUDP3150=DeepThroatUDP3215=XHXUDP3268=MicrosoftGlobalCatalogUDP3269=MicrosoftGlobalCatalogwithLDAP/SSLUDP3333=DaodanUDP3535=MicrosoftClassServerUDP3801=EclypseUDP3996=RemoteAnythingUDP4128=RedShadUDP4156=SlapperUDP4350=NetDeviceUDP4500=MicrosoftIPsecNAT-T,sae-urnUDP5419=DarkSkyUDP5503=RemoteShellTrojanUDP5555=DaodanUDP5678=RemoteReplicationAgentConnectionUDP5679=DirectCableConnectManagerUDP5720=MicrosoftLicensingUDP5882=Y3KRATUDP5888=Y3KRATUDP6073=DirectPlay8UDP6112=Battle.netGameUDP6666=KiLoUDP6667=KiLoUDP6766=KiLoUDP6767=KiLo,UandMeUDP6838=MstreamAgent-handlerUDP7028=未知木马UDP7424=HostControlUDP7788=SingularityUDP7983=MStreamhandler-agentUDP8012=PtakksUDP8090=Aphex\'sRemotePacketSnifferUDP8127=9_119,ChonkerUDP8488=KiLoUDP8489=KiLoUDP8787=BackOrifice2000UDP8879=BackOrifice2000UDP9325=MStreamAgent-handlerUDP10000=XHXUDP10067=PortalofDoomUDP10084=SyphillisUDP10100=SlapperUDP10167=PortalofDoomUDP10498=MstreamUDP10666=AmbushUDP11225=CynUDP12321=ProtossUDP12345=BlueIce2000UDP12378=W32/Gibe@MMUDP12623=ButtMan,DUNControlUDP11320=IMIPChannelsPortUDP15210=UDPremoteshellbackdoorserverUDP15486=KiLoUDP16514=KiLoUDP16515=KiLoUDP18753=ShafthandlertoAgentUDP20433=ShaftUDP21554=GirlFriendUDP22784=Backdoor.IntruzzoUDP23476=DonaldDickUDP25123=MOTDUDP26274=DeltaSourceUDP26374=Sub-72.1UDP26444=Trin00/TFN2KUDP26573=Sub-72.1UDP27184=Alvgustrojan2000UDP27444=TrinooUDP29589=KiLoUDP29891=TheUnexplainedUDP30103=NetSphereUDP31320=LittleWitchUDP31335=Trin00DoSAttackUDP31337=BaronNight,BOclient,BO2,BoFacil,BackFire,BackOrifice,DeepBOUDP31338=BackOrifice,NetSpyDK,DeepBOUDP31339=LittleWitchUDP31340=LittleWitchUDP31416=LithiumUDP31787=HackaTackUDP31789=HackaTackUDP31790=HackaTackUDP31791=HackaTackUDP33390=未知木马UDP34555=TrinooUDP35555=TrinooUDP43720=KiLoUDP44014=IaniUDP44767=SchoolBusUDP46666=TaskmanUDP47262=DeltaSourceUDP47624=DirectPlayServerUDP47785=KiLoUDP49301=OnLinekeyLoggerUDP49683=FensterUDP49698=KiLoUDP52901=OmegaUDP54320=BackOrificeUDP54321=BackOrifice2000UDP54341=NetRaiderTrojanUDP61746=KiLOUDP61747=KiLOUDP61748=KiLOUDP65432=TheTraitor[编辑本段]怎样查看端口一台服务器有大量的端口在使用,怎么来查看端口呢?有两种方式:一种是利用系统内置的命令,一种是利用第三方端口扫描软件。1.用“netstat-an”查看端口状态在Windows2000/XP中,可以在命令提示符下使用“netstat-an”查看系统端口状态,可以列出系统正在开放的端口号及其状态.2.用第三方端口扫描软件第三方端口扫描软件有许多,界面虽然千差万别,但是功能却是类似的。这里以“Fport”(可到http://www.ccert.edu.cn/tools/index.php?type_t=7或http://www.ccidnet.com/soft/cce下载)为例讲解。“Fport”在命令提示符下使用,运行结果与“netstat-an”相似,但是它不仅能够列出正在使用的端口号及类型,还可以列出端口被哪个应用程序使用。3.用“netstat-n”命令,以数字格式显示地址和端口信息。[编辑本段]端口号很多是奇数的原因如果仔细检查这些标准的简单服务以及其他标准的TCP/IP服务(如Telnet、FTP、SMTP等)的端口号时,我们发现它们都是奇数。这是有历史原因的,因为这些端口号都是从NCP端口号派生出来的(NCP,即网络控制协议,是ARPANET的运输层协议,是TCP的前身)。NCP是半双工的,不是全双工的,因此每个应用程序需要两个连接,需预留一对奇数和偶数端口号。当TCP和UDP成为标准的运输层协议时,每个应用程序只需要一个端口号,因此就使用了NCP中的奇数。',)


  • 编号:1700772748
  • 分类:其他文档
  • 软件: wps,office word
  • 大小:18页
  • 格式:docx
  • 风格:商务
  • PPT页数:143872 KB
  • 标签:

广告位推荐

相关其他文档更多>