亚洲成a人片在线不卡一二三区,天天看在线视频国产,亚州Av片在线劲爆看,精品国产sm全部网站

        ssl端口號共(大全)

        發(fā)布時(shí)間:2022-03-10 18:51:45

        千文網(wǎng)小編為你整理了多篇相關(guān)的《ssl端口號共(大全)》,但愿對你工作學(xué)習(xí)有幫助,當(dāng)然你在千文網(wǎng)還可以找到更多《ssl端口號共(大全)》。

        第一篇:SSL實(shí)驗(yàn)報(bào)告

        搭建證書服務(wù)器

        步驟:

        1、登陸Windows Server 2008服務(wù)器

        2、打開【服務(wù)器管理器】

        3、點(diǎn)擊【添加角色】,之后點(diǎn)擊【下一步】

        4、找到【Active Directory證書服務(wù)】勾選此選項(xiàng),之后點(diǎn)擊【下一步】;

        5、進(jìn)入證書服務(wù)簡介界面,點(diǎn)擊【下一步】

        6、將證書頒發(fā)機(jī)構(gòu)、證書頒發(fā)機(jī)構(gòu)WEB注冊勾選上,然后點(diǎn)擊【下一步】

        7、勾選【獨(dú)立】選項(xiàng),點(diǎn)擊【下一步】(由于不在域管理中創(chuàng)建,直接默認(rèn)為:“獨(dú)立”)

        8、首次創(chuàng)建,勾選【根CA】,之后點(diǎn)擊【下一步】

        9、首次創(chuàng)建勾選【新建私鑰】,之后點(diǎn)擊【下一步】;

        10、默認(rèn),繼續(xù)點(diǎn)擊【下一步】;

        11、默認(rèn),繼續(xù)點(diǎn)擊【下一步】

        12、默認(rèn),繼續(xù)點(diǎn)擊【下一步】

        13、默認(rèn),繼續(xù)點(diǎn)擊【下一步】

        14、點(diǎn)擊【安裝】

        15、點(diǎn)擊【關(guān)閉】,證書服務(wù)器安裝完成

        搭建WEB服務(wù)器端SSL證書應(yīng)用

        步驟:

        1、打開IIS,WEB服務(wù)器,找到【服務(wù)器證書】并選中

        2、點(diǎn)擊【服務(wù)器證書】,找到【創(chuàng)建證書申請】項(xiàng)

        3、單擊【創(chuàng)建證書申請】,打開【創(chuàng)建證書申請】后,填寫相關(guān)文本框,“通用名稱”必需填寫本機(jī)IP(192.168.72.128),單擊【下一步】

        4、默認(rèn),點(diǎn)擊【下一步】

        5、選擇并填寫需要生成文件的保存路徑與文件名, 此文件后期將會被使用;(保存位置、文件名可以自行設(shè)定),之后點(diǎn)擊【完成】,此配置完成,子界面會關(guān)閉

        6、接下來,點(diǎn)擊IE(瀏覽器),訪問:http://192.168.72.128/certsrv/(本機(jī)ip)此時(shí)會出現(xiàn)證書服務(wù)頁面;點(diǎn)擊【申請證書】,進(jìn)入下一界面點(diǎn)擊【高級證書申請】,進(jìn)入下一界面點(diǎn)擊【創(chuàng)建并向此CA提交一個申請】,進(jìn)入下一界面,此時(shí)會彈出一個提示窗口:“為了完成證書注冊,必須將該CA的網(wǎng)站配置為使用HTTPS身份驗(yàn)證”;也就是必須將HTTP網(wǎng)站配置為HTTPS的網(wǎng)站,才能正常訪問當(dāng)前網(wǎng)頁及功能

        7、搭建HTTPS的網(wǎng)站:

        方法:打開IE(瀏覽器),找到工具欄,點(diǎn)擊【工具欄】,找到它下面的【Internet選項(xiàng)】;

        、點(diǎn)擊【Internet選項(xiàng)】->點(diǎn)擊【安全】->點(diǎn)擊【可信站點(diǎn)】;

        10、點(diǎn)擊【可信站點(diǎn)】,并輸入之前的證書網(wǎng)站地址:http://192.168.72.128/certsrv,并將其【添加】到信任站點(diǎn)中;添加完后,點(diǎn)擊【關(guān)閉】,關(guān)閉子界面

        11、接下來,繼續(xù)在【可信站點(diǎn)】位置點(diǎn)擊【自定義級別】,此時(shí)會彈出一個【安全設(shè)置】子界面,在安全設(shè)置界面中拖動右別的滾動條,找到【對未標(biāo)記為可安全執(zhí)行腳本的ActiveX控件初始化并執(zhí)行腳本】選項(xiàng),將選為【啟用】;之后點(diǎn)擊所有【確定】操作,直到【Internet選項(xiàng)】子界面關(guān)閉為止

        12、完成上面操作后,先將IE關(guān)閉,然后重新打開,輸入:http://192.168.72.128/certsrv;頁面出來后點(diǎn)擊【申請證書】,【高級證書申請】,【使用base64編碼的CMC或PKCS#10文件提交一個證書申請,或使用Base64編碼的PKCS#7文件續(xù)訂證書申請】

        13、將之前保存的密鑰文檔文件找到并打開,將里面的文本信息復(fù)制并粘貼到“Base-64編碼的證書申請”文本框中;確定文本內(nèi)容無誤后,點(diǎn)擊【提交】

        14、此時(shí)可以看到提交信息,申請已經(jīng)提交給證書服務(wù)器,關(guān)閉當(dāng)前IE

        15、打開證書服務(wù)器處理用戶剛才提交的證書申請; 回到Windows【桌面】->點(diǎn)擊【開始】->點(diǎn)擊【運(yùn)行】,在運(yùn)行位置輸入:certsrv.msc,然后回車就會打開證書服務(wù)功能界面;

        打開后,找到【掛起的申請】位置,可以看到之前提交的證書申請;

        (圖17)

        18、點(diǎn)擊鼠標(biāo)右鍵會出現(xiàn)【所有任務(wù)】,點(diǎn)擊【所有任務(wù)】->點(diǎn)擊【頒發(fā)】將掛起的證書申請審批通過,此時(shí)掛起的證書會從當(dāng)前界面消失,即代表已完成操作

        19、點(diǎn)擊【頒發(fā)的證書】,可以看到新老已審批通過的證書

        20、重新打開IE,輸入之前的網(wǎng)址:http://192.168.72.128/certsrv/; 打開頁面后,可點(diǎn)擊【查看掛起的證書申請的狀態(tài)】;之后會進(jìn)入“查看掛起的證書申請的狀態(tài)”頁面,點(diǎn)擊【保存的申請證書】;

        21、進(jìn)入新頁面后,勾選Base 64編碼,然后點(diǎn)擊【下載證書】,將已申請成功的證書保存到指定位置,后續(xù)待用;

        22、打開IIS服務(wù)器,點(diǎn)擊【服務(wù)器證書】->【完成證書申請】->選擇剛保存的證書,然后在“好記名稱”文本框中輸入自定義的名稱,完后點(diǎn)擊【確定】

        23、上述操作完后,可在“服務(wù)器證書”界面下看到證書

        24、點(diǎn)擊左邊的【Default Web Site】菜單,然后找到【綁定】功能,點(diǎn)擊【綁定】功能,會彈出【網(wǎng)站綁定】界面,默認(rèn)會出現(xiàn)一個類型為http,端口為80的主機(jī)服務(wù),然后點(diǎn)擊【添加】,會彈出【添加網(wǎng)站綁定】界面,在此界面中選擇“類型:https”、“SSL證書:JZT_TEST1”,然后點(diǎn)【確定】;點(diǎn)完確定后,會看到【網(wǎng)站綁定】子界面中有剛配的HTTPS服務(wù),點(diǎn)擊【關(guān)閉】,子界面消失

        25、點(diǎn)擊左菜單上的【CertSrv】證書服務(wù)網(wǎng)站,然后點(diǎn)擊【SSL設(shè)置】

        26、進(jìn)入SSL設(shè)置頁面,勾選上“要求SSL”即啟用SSL功能,然后點(diǎn)擊【應(yīng)用】,保存設(shè)置

        27、打開IE,再次輸入:https://192.168.70.128

        第二篇:知名端口號

        知名端口號

        //注: 由于一些應(yīng)用軟件占用了部分端口, 因此此文件中的部分端口被注釋掉了(注釋字符為: //)

        TCP 1=TCP Port Service Multiplexer

        TCP 2=Death

        TCP 5=Remote Job Entry,yoyo

        TCP 7=Echo

        TCP 11=Skun

        TCP 12=Bomber

        TCP 16=Skun

        TCP 17=Skun

        TCP 18=消息傳輸協(xié)議,skun

        TCP 19=Skun

        TCP 20=FTP Data,Amanda

        TCP 21=文件傳輸,Back Construction,Blade Runner,Doly Trojan,Fore,FTP trojan,Invisible FTP,Larva, WebEx,WinCrash

        TCP 22=遠(yuǎn)程登錄協(xié)議

        TCP 23=遠(yuǎn)程登錄(Telnet),Tiny Telnet Server (= TTS)

        TCP 25=電子郵件(SMTP),Ajan,Antigen,Email Paword Sender,Happy 99,Kuang2,ProMail trojan,Shtrilitz,Stealth,Tapiras,Terminator,WinPC,WinSpy,Haebu Coceda

        TCP 27=Aasin

        TCP 28=Amanda

        TCP 29=MSG ICP

        TCP 30=Agent 40421

        TCP 31=Agent 31,Hackers Paradise,Masters Paradise,Agent 40421

        TCP 37=Time,ADM worm

        TCP 39=SubSARI

        TCP 41=DeepThroat,Foreplay

        TCP 42=Host Name Server

        TCP 43=WHOIS

        TCP 44=Arctic

        TCP 48=DRAT

        TCP 49=主機(jī)登錄協(xié)議

        TCP 50=DRAT

        TCP 51=IMP Logical Addre Maintenance,Fuck Lamers Backdoor

        TCP 52=MuSka52,Skun

        TCP 53=DNS,Bonk (DOS Exploit)

        TCP 54=MuSka52

        TCP 58=DMSetup

        TCP 59=DMSetup

        TCP 63=whois++

        TCP 64=communications Integrator

        TCP 65=TACACS-Database Service

        TCP 66=Oracle SQL*NET,AL-Bareki

        TCP 67=Bootstrap Protocol Server

        TCP 68=Bootstrap Protocol Client

        TCP 69=W32.Evala.Worm,BackGate Kit,Nimda,Pasana,Storm,Storm worm,Theef,Worm.Cycle.a

        TCP 70=Gopher服務(wù),ADM worm

        TCP 79=用戶查詢

        (Finger),Firehotcker,ADM worm

        TCP 80=超文本服務(wù)器(Http),Executor,RingZero

        TCP 81=Chubo,Worm.Bbeagle.q

        TCP 82=Netsky-Z

        TCP 88=Kerberos krb5服務(wù)

        TCP 99=Hidden Port

        TCP 102=消息傳輸代理

        TCP 108=SNA網(wǎng)關(guān)訪問服務(wù)器

        TCP 109=Pop2

        TCP 110=電子郵件(Pop3),ProMail

        TCP 113=Kazimas, Auther Idnet

        TCP 115=簡單文件傳輸協(xié)議

        TCP 118=SQL Services, Infector 1.4.2

        TCP 119=新聞組傳輸協(xié)議(Newsgroup(Nntp)), Happy 99

        TCP 121=JammerKiller, Bo jammerkillah

        TCP 123=網(wǎng)絡(luò)時(shí)間協(xié)議(NTP),Net Controller

        TCP 129=Paword Generator Protocol

        TCP 133=Infector 1.x

        TCP 135=微軟DCE RPC end-point mapper服務(wù)

        TCP 137=微軟Netbios Name服務(wù)(網(wǎng)上鄰居傳輸文件使用)

        TCP 138=微軟Netbios Name服務(wù)(網(wǎng)上鄰居傳輸文件使用)

        TCP 139=微軟Netbios Name服務(wù)(用于文件及打印機(jī)共享)

        TCP 142=NetTaxi

        TCP 143=IMAP

        TCP 146=FC Infector,Infector

        TCP 150=NetBIOS Seion Service

        TCP 156=SQL服務(wù)器

        TCP 161=Snmp

        TCP 162=Snmp-Trap

        TCP 170=A-Trojan

        TCP 177=X Display管理控制協(xié)議

        TCP 179=Border網(wǎng)關(guān)協(xié)議(BGP)

        TCP 190=網(wǎng)關(guān)訪問控制協(xié)議(GACP)

        TCP 194=Irc

        TCP 197=目錄定位服務(wù)(DLS)

        TCP 256=Nirvana

        TCP 315=The Invasor

        TCP 371=ClearCase版本管理軟件

        TCP 389=Lightweight Directory Acce Protocol (LDAP)

        TCP 396=Novell Netware over IP

        TCP 420=Breach

        TCP 421=TCP Wrappers

        TCP 443=安全服務(wù)

        TCP 444=Simple Network Paging Protocol(SNPP)

        TCP 445=Microsoft-DS

        TCP 455=Fatal Connections

        TCP 456=Hackers paradise,FuseSpark

        TCP 458=蘋果公司QuickTime

        TCP 513=Grlogin

        TCP 514=RPC Backdoor

        TCP 520=Rip

        TCP 531=Rasmin,Net666

        TCP 544=kerberos kshell

        TCP 546=DHCP Client

        TCP 547=DHCP Server

        TCP 548=Macintosh文件服務(wù)

        TCP 555=Ini-Killer,Phase Zero,Stealth Spy

        TCP 569=MSN

        TCP 605=SecretService

        TCP 606=Noknok8

        TCP 660=DeepThroat

        TCP 661=Noknok8

        TCP 666=Attack FTP,Satanz Backdoor,Back Construction,Dark Connection Inside 1.2

        TCP 667=Noknok7.2

        TCP 668=Noknok6

        TCP 669=DP trojan

        TCP 692=GayOL

        TCP 707=Welchia,nachi

        TCP 777=AIM Spy

        TCP 808=RemoteControl,WinHole

        TCP 815=Everyone Darling

        TCP 901=Backdoor.Devil

        TCP 911=Dark Shadow

        TCP 993=IMAP

        TCP 999=DeepThroat

        TCP 1000=Der Spaeher

        TCP 1001=Silencer,WebEx,Der Spaeher

        TCP 1003=BackDoor

        TCP 1010=Doly

        TCP 1011=Doly

        TCP 1012=Doly

        TCP 1015=Doly

        TCP 1016=Doly

        TCP 1020=Vampire

        TCP 1023=Worm.Saer.e

        TCP 1024=NetSpy.698(YAI)

        TCP 1059=nimreg

        //TCP 1025=NetSpy.698,Unused Windows Services Block

        //TCP 1026=Unused Windows Services Block

        //TCP 1027=Unused Windows Services Block

        TCP 1028=應(yīng)用層網(wǎng)關(guān)服務(wù)

        //TCP 1029=Unused Windows Services Block

        //TCP 1030=Unused Windows Services Block

        //TCP 1033=Netspy

        //TCP 1035=Multidropper

        //TCP 1042=Bla

        //TCP 1045=Rasmin

        //TCP 1047=GateCrasher

        //TCP 1050=Minicommand

        TCP 1058=nim

        TCP 1069=Backdoor.TheefServer.202

        TCP 1070=Voice,Psyber Stream Server,Streaming Audio Trojan

        TCP 1079=ASPROVATalk

        TCP

        1080=Wingate,Worm.BugBear.B,Worm.Novarg.B

        //TCP 1090=Xtreme, VDOLive

        //TCP 1092=LoveGate

        //TCP 1095=Rat

        //TCP 1097=Rat

        //TCP 1098=Rat

        //TCP 1099=Rat

        TCP 1109=Pop with Kerberos

        TCP 1110=nfsd-keepalive

        TCP 1111=Backdoor.AIMVision

        TCP 1155=Network File Acce

        //TCP 1170=Psyber Stream

        Server,Streaming Audio trojan,Voice

        //TCP 1200=NoBackO

        //TCP 1201=NoBackO

        //TCP 1207=Softwar

        //TCP 1212=Nirvana,Visul Killer

        //TCP 1234=Ultors

        //TCP 1243=BackDoor-G, SubSeven, SubSeven Apocalypse

        //TCP 1245=VooDoo Doll

        //TCP 1269=Mavericks Matrix

        TCP 1270=Microsoft Operations Manager

        //TCP 1313=Nirvana

        //TCP 1349=BioNet

        TCP 1352=Lotus Notes

        TCP 1433=Microsoft SQL Server

        TCP 1434=Microsoft SQL Monitor

        //TCP 1441=Remote Storm

        //TCP

        1492=FTP99CMP(BackOriffice.FTP)

        TCP 1503=NetMeeting T.120

        TCP 1512=Microsoft Windows Internet Name Service

        //TCP 1509=Psyber Streaming Server

        TCP 1570=Orbix Daemon

        //TCP 1600=Shivka-Burka

        //TCP 1703=Exloiter 1.1

        TCP 1720=NetMeeting H.233 call Setup

        TCP 1731=NetMeeting音頻調(diào)用控制

        TCP 1745=ISA Server proxy autoconfig, Remote Winsock

        TCP 1801=Microsoft Meage Queue

        //TCP 1807=SpySender

        TCP 1906=Backdoor/Verify.b

        TCP 1907=Backdoor/Verify.b

        //TCP 1966=Fake FTP 2000

        //TCP 1976=Custom port

        //TCP 1981=Shockrave

        TCP 1990=stun-p1 cisco STUN Priority 1 port

        TCP 1990=stun-p1 cisco STUN Priority 1 port

        TCP 1991=stun-p2 cisco STUN Priority 2 port

        TCP 1992=stun-p3 cisco STUN Priority 3 port,ipsendmsg IPsendmsg

        TCP 1993=snmp-tcp-port cisco SNMP TCP port

        TCP 1994=stun-port cisco serial tunnel port

        TCP 1995=perf-port cisco perf port

        TCP 1996=tr-rsrb-port cisco Remote SRB port

        TCP 1997=gdp-port cisco Gateway Discovery Protocol

        TCP 1998=x25-svc-port cisco X.25 service (XOT)

        //TCP 1999=BackDoor, TransScout

        //TCP 2000=Der Spaeher,INsane Network

        TCP 2002=W32.Beagle.AX @mm

        //TCP 2001=Transmion scout

        //TCP 2002=Transmion scout

        //TCP 2003=Transmion scout

        //TCP 2004=Transmion scout

        //TCP 2005=TTransmion scout

        TCP 2011=cypre

        TCP 2015=raid-cs

        //TCP 2023=Ripper,Pa Ripper,Hack City Ripper Pro

        TCP 2049=NFS

        //TCP 2115=Bugs

        //TCP 2121=Nirvana

        //TCP 2140=Deep Throat, The Invasor

        //TCP 2155=Nirvana

        //TCP 2208=RuX

        TCP 2234=DirectPlay

        //TCP 2255=Illusion Mailer

        //TCP 2283=HVL Rat5

        //TCP 2300=PC Explorer

        //TCP 2311=Studio54

        TCP 2556=Worm.Bbeagle.q

        //TCP 2565=Striker

        //TCP 2583=WinCrash

        //TCP 2600=Digital RootBeer

        //TCP 2716=Prayer Trojan

        TCP 2745=Worm.BBeagle.k

        //TCP 2773=Backdoor,SubSeven

        //TCP 2774=SubSeven2.1&2.2

        //TCP 2801=Phineas Phucker

        TCP 2967=SSC Agent

        //TCP 2989=Rat

        //TCP 3024=WinCrash trojan

        TCP 3074=Microsoft Xbox game port

        TCP 3127=Worm.Novarg

        TCP 3128=RingZero,Worm.Novarg.B

        //TCP 3129=Masters Paradise

        TCP 3132=Microsoft Busine Rule Engine Update Service

        //TCP 3150=Deep Throat, The Invasor

        TCP 3198=Worm.Novarg

        //TCP 3210=SchoolBus

        TCP 3268=Microsoft Global Catalog

        TCP 3269=Microsoft Global Catalog with LDAP/SSL

        TCP 3332=Worm.Cycle.a

        TCP 3333=Prosiak

        TCP 3535=Microsoft Cla Server

        TCP 3389=超級終端

        //TCP 3456=Terror

        //TCP 3459=Eclipse 2000

        //TCP 3700=Portal of Doom

        //TCP 3791=Eclypse

        //TCP 3801=Eclypse

        TCP 3847=Microsoft Firewall Control

        TCP 3996=Portal of Doom,RemoteAnything

        TCP 4000=騰訊QQ客戶端

        TCP 4060=Portal of Doom,RemoteAnything

        TCP 4092=WinCrash

        TCP 4242=VHM

        TCP 4267=SubSeven2.1&2.2

        TCP 4321=BoBo

        TCP 4350=Net Device

        TCP 4444=Prosiak,Swift remote

        TCP 4500=Microsoft IPsec NAT-T, W32.HLLW.Tufas

        TCP 4567=File Nail

        TCP 4661=Backdoor/Surila.f

        TCP 4590=ICQTrojan

        TCP 4899=Remote Administrator服務(wù)器

        TCP 4950=ICQTrojan

        TCP 5000=WindowsXP服務(wù)器,Blazer

        5,Bubbel,Back Door Setup,Sockets de Troie

        TCP 5001=Back Door Setup, Sockets de Troie

        TCP 5002=cd00r,Shaft

        TCP 5011=One of the Last Trojans (OOTLT)

        TCP 5025=WM Remote KeyLogger

        TCP

        5031=Firehotcker,Metropolitan,NetMetro

        TCP 5032=Metropolitan

        TCP 5190=ICQ Query

        TCP 5321=Firehotcker

        TCP 5333=Backage Trojan Box 3

        TCP 5343=WCrat

        TCP 5400=Blade Runner, BackConstruction1.2

        TCP 5401=Blade Runner,Back Construction

        TCP 5402=Blade Runner,Back Construction

        TCP 5471=WinCrash

        TCP 5512=Illusion Mailer

        TCP 5521=Illusion Mailer

        TCP 5550=Xtcp,INsane Network

        TCP 5554=Worm.Saer

        TCP 5555=ServeMe

        TCP 5556=BO Facil

        TCP 5557=BO Facil

        TCP 5569=Robo-Hack

        TCP 5598=BackDoor 2.03

        TCP 5631=PCAnyWhere data

        TCP 5632=PCAnyWhere

        TCP 5637=PC Crasher

        TCP 5638=PC Crasher

        TCP 5678=Remote Replication Agent Connection

        TCP 5679=Direct Cable Connect Manager

        TCP 5698=BackDoor

        TCP 5714=Wincrash3

        TCP 5720=Microsoft Licensing

        TCP 5741=WinCrash3

        TCP 5742=WinCrash

        TCP 5760=Portmap Remote Root Linux Exploit

        TCP 5880=Y3K RAT

        TCP 5881=Y3K RAT

        TCP 5882=Y3K RAT

        TCP 5888=Y3K RAT

        TCP 5889=Y3K RAT

        TCP 5900=WinVnc

        TCP 6000=Backdoor.AB

        TCP 6006=Noknok8

        TCP 6073=DirectPlay8

        TCP 6129=Dameware Nt Utilities服務(wù)器

        TCP 6272=SecretService

        TCP 6267=廣外女生

        TCP 6400=Backdoor.AB,The Thing

        TCP 6500=Devil 1.03

        TCP 6661=Teman

        TCP 6666=TCPshell.c

        TCP 6667=NT Remote Control,Wise 播放器接收端口

        TCP 6668=Wise Video廣播端口

        TCP 6669=Vampyre

        TCP 6670=DeepThroat,iPhone

        TCP 6671=Deep Throat 3.0

        TCP 6711=SubSeven

        TCP 6712=SubSeven1.x

        TCP 6713=SubSeven

        TCP 6723=Mstream

        TCP 6767=NT Remote Control

        TCP 6771=DeepThroat

        TCP 6776=BackDoor-G,SubSeven,2000 Cracks

        TCP 6777=Worm.BBeagle

        TCP 6789=Doly Trojan

        TCP 6838=Mstream

        TCP 6883=DeltaSource

        TCP 6912=Shit Heep

        TCP 6939=Indoctrination

        TCP 6969=GateCrasher, Priority, IRC 3

        TCP 6970=RealAudio,GateCrasher

        TCP 7000=Remote Grab,NetMonitor,SubSeven1.x

        TCP 7001=Freak88, Weblogic默認(rèn)端口

        TCP 7201=NetMonitor

        TCP 7215=BackDoor-G, SubSeven

        TCP 7001=Freak88,Freak2k

        TCP 7300=NetMonitor

        TCP 7301=NetMonitor

        TCP 7306=NetMonitor,NetSpy 1.0

        TCP 7307=NetMonitor, ProcSpy

        TCP 7308=NetMonitor, X Spy

        TCP 7323=Sygate服務(wù)器端

        TCP 7424=Host Control

        TCP 7511=聰明基因

        TCP 7597=Qaz

        TCP 7609=Snid X2

        TCP 7626=冰河

        TCP 7777=The Thing

        TCP 7789=Back Door Setup, ICQKiller

        TCP 7983=Mstream

        TCP 8000=騰訊OICQ服務(wù)器端,XDMA

        TCP 8010=Wingate,Logfile

        TCP 8011=WAY2.4

        TCP 8080=WWW 代理(如:Tomcat的默認(rèn)端口),Ring Zero,Chubo,Worm.Novarg.B

        TCP 8102=網(wǎng)絡(luò)神偷

        TCP 8181=W32.Erkez.D@mm

        TCP 8520=W32.Socay.Worm

        TCP 8594=I-Worm/Bozori.a

        TCP 8787=BackOfrice 2000

        TCP 8888=Winvnc

        TCP 8897=Hack Office,Armageddon

        TCP 8989=Recon

        TCP 9000=Netministrator

        TCP 9080=WebSphere

        TCP 9325=Mstream

        TCP 9400=Incommand 1.0

        TCP 9401=Incommand 1.0

        TCP 9402=Incommand 1.0

        TCP 9535=Remote Man Server

        TCP 9872=Portal of Doom

        TCP 9873=Portal of Doom

        TCP 9874=Portal of Doom

        TCP 9875=Portal of Doom

        TCP 9876=Cyber Attacker

        TCP 9878=TransScout

        TCP 9989=Ini-Killer

        TCP 9898=Worm.Win32.Dabber.a

        TCP 9999=Prayer Trojan

        TCP 10067=Portal of Doom

        TCP 10080=Worm.Novarg.B

        TCP 10084=Syphillis

        TCP 10085=Syphillis

        TCP 10086=Syphillis

        TCP 10101=BrainSpy

        TCP 10167=Portal Of Doom

        TCP

        10168=Worm.Supnot.78858.c,Worm.LovGate.T

        TCP 10520=Acid Shivers

        TCP 10607=coma trojan

        TCP 10666=Ambush

        TCP 11000=Senna Spy

        TCP 11050=Host Control

        TCP 11051=Host Control

        TCP 11223=Progenic,Hack \\'99KeyLogger

        TCP 11320=IMIP Channels Port

        TCP 11831=TROJ_LATINUS.SVR

        TCP 12076=Gjamer, MSH.104b

        TCP 12223=Hack\\'99 KeyLogger

        TCP 12345=GabanBus, NetBus 1.6/1.7, Pie Bill Gates, X-bill

        TCP 12346=GabanBus, NetBus 1.6/1.7, X-bill

        TCP 12349=BioNet

        TCP 12361=Whack-a-mole

        TCP 12362=Whack-a-mole

        TCP 12363=Whack-a-mole

        TCP 12378=W32/Gibe@MM

        TCP 12456=NetBus

        TCP 12623=DUN Control

        TCP 12624=Buttman

        TCP 12631=WhackJob, WhackJob.NB1.7

        TCP 12701=Eclipse2000

        TCP 12754=Mstream

        TCP 13000=Senna Spy

        TCP 13010=Hacker Brazil

        TCP 13013=Psychward

        TCP 13223=Tribal Voice的聊天程序PowWow

        TCP 13700=Kuang2 The Virus

        TCP 14456=Solero

        TCP 14500=PC Invader

        TCP 14501=PC Invader

        TCP 14502=PC Invader

        TCP 14503=PC Invader

        TCP 15000=NetDaemon 1.0

        TCP 15092=Host Control

        TCP 15104=Mstream

        TCP 16484=Mosucker

        TCP 16660=Stacheldraht (DDoS)

        TCP 16772=ICQ Revenge

        TCP 16959=Priority

        TCP 16969=Priority

        TCP 17027=提供廣告服務(wù)的Conducent\\\"adbot\\\"共享軟件

        TCP 17166=Mosaic

        TCP 17300=Kuang2 The Virus

        TCP 17490=CrazyNet

        TCP 17500=CrazyNet

        TCP 17569=Infector 1.4.x + 1.6.x

        TCP 17777=Nephron

        TCP 18753=Shaft (DDoS)

        TCP 19191=藍(lán)色火焰

        TCP 19864=ICQ Revenge

        TCP 20000=Millennium II (GrilFriend)

        TCP 20001=Millennium II (GrilFriend)

        TCP 20002=AcidkoR

        TCP 20034=NetBus 2 Pro

        TCP 20168=Lovgate

        TCP 20203=Logged,Chupacabra

        TCP 20331=Bla

        TCP 20432=Shaft (DDoS)

        TCP 20808=Worm.LovGate.v.QQ

        TCP 21335=Tribal Flood Network,Trinoo

        TCP 21544=Schwindler 1.82,GirlFriend

        TCP 21554=Schwindler

        1.82,GirlFriend,Exloiter 1.0.1.2

        TCP 22222=Prosiak,RuX Uploader 2.0

        TCP 22784=Backdoor.Intruzzo

        TCP 23432=Asylum 0.1.3

        TCP 23444=網(wǎng)絡(luò)公牛

        TCP 23456=Evil FTP, Ugly FTP, WhackJob

        TCP 23476=Donald Dick

        TCP 23477=Donald Dick

        TCP 23777=INet Spy

        TCP 26274=Delta

        TCP 26681=Spy Voice

        TCP 27374=Sub Seven 2.0+, Backdoor.Baste

        TCP 27444=Tribal Flood Network,Trinoo

        TCP 27665=Tribal Flood Network,Trinoo

        TCP 29431=Hack Attack

        TCP 29432=Hack Attack

        TCP 29104=Host Control

        TCP 29559=TROJ_LATINUS.SVR

        TCP 29891=The Unexplained

        TCP 30001=Terr0r32

        TCP 30003=Death,Lamers Death

        TCP 30029=AOL trojan

        TCP 30100=NetSphere 1.27a,NetSphere 1.31

        TCP 30101=NetSphere 1.31,NetSphere 1.27a

        TCP 30102=NetSphere 1.27a,NetSphere 1.31

        TCP 30103=NetSphere 1.31

        TCP 30303=Sockets de Troie

        TCP 30722=W32.Esbot.A

        TCP 30947=Intruse

        TCP 30999=Kuang2

        TCP 31336=Bo Whack

        TCP 31337=Baron Night,BO

        client,BO2,Bo Facil,BackFire,Back Orifice,DeepBO,Freak2k,NetSpy

        TCP 31338=NetSpy,Back Orifice,DeepBO

        TCP 31339=NetSpy DK

        TCP 31554=Schwindler

        TCP 31666=BOWhack

        TCP 31778=Hack Attack

        TCP 31785=Hack Attack

        TCP 31787=Hack Attack

        TCP 31789=Hack Attack

        更新時(shí)間: 2007年8月6日

        TCP 31791=Hack Attack

        TCP 31792=Hack Attack

        TCP 32100=PeanutBrittle

        TCP 32418=Acid Battery

        TCP 33333=Prosiak,Blakharaz 1.0

        TCP 33577=Son Of Psychward

        TCP 33777=Son Of Psychward

        TCP 33911=Spirit 2001a

        TCP 34324=BigGluck,TN,Tiny Telnet Server

        TCP 34555=Trin00 (Windows) (DDoS)

        TCP 35555=Trin00 (Windows) (DDoS)

        TCP 36794=Worm.Bugbear-A

        TCP 37651=YAT

        TCP 40412=The Spy

        TCP 40421=Agent 40421,Masters Paradise.96

        TCP 40422=Masters Paradise

        TCP 40423=Masters Paradise.97

        TCP 40425=Masters Paradise

        TCP 40426=Masters Paradise 3.x

        TCP 41666=Remote Boot

        TCP 43210=Schoolbus 1.6/2.0

        TCP 44444=Delta Source

        TCP 44445=Happypig

        TCP 45576=未知代理

        TCP 47252=Prosiak

        TCP 47262=Delta

        TCP 47624=Direct Play Server

        TCP 47878=BirdSpy2

        TCP 49301=Online Keylogger

        TCP 50505=Sockets de Troie

        TCP 50766=Fore, Schwindler

        TCP 51966=CafeIni

        TCP 53001=Remote Windows Shutdown

        TCP 53217=Acid Battery 2000

        TCP 54283=Back Door-G, Sub7

        TCP 54320=Back Orifice 2000,Sheep

        TCP 54321=School Bus .69-1.11,Sheep, BO2K

        TCP 57341=NetRaider

        TCP 58008=BackDoor.Tron

        TCP 58009=BackDoor.Tron

        TCP 58339=ButtFunnel

        TCP 59211=BackDoor.DuckToy

        TCP 60000=Deep Throat

        TCP 60068=Xzip 6000068

        TCP 60411=Connection

        TCP 60606=TROJ_BCKDOR.G2.A

        TCP 61466=Telecommando

        TCP 61603=Bunker-kill

        TCP 63485=Bunker-kill

        TCP 65000=Devil, DDoS

        TCP 65432=Th3tr41t0r, The Traitor

        TCP 65530=TROJ_WINMITE.10

        TCP 65535=RC,Adore Worm/Linux

        TCP 69123=ShitHeep

        TCP 88798=Armageddon,Hack Office

        UDP 1=Sockets des Troie

        UDP 9=Chargen

        UDP 19=Chargen

        UDP 69=Pasana

        UDP 80=Penrox

        UDP 371=ClearCase版本管理軟件

        UDP 445=公共Internet文件系統(tǒng)(CIFS)

        UDP 500=Internet密鑰交換

        UDP 1025=Maverick\\'s Matrix 1.2 - 2.0

        UDP 1026=Remote Explorer 2000

        UDP 1027=HP服務(wù),UC聊天軟件,Trojan.Huigezi.e

        UDP 1028=應(yīng)用層網(wǎng)關(guān)服務(wù),KiLo,SubSARI

        UDP 1029=SubSARI

        UDP 1031=Xot

        UDP 1032=Akosch4

        UDP 1104=RexxRave

        UDP 1111=Daodan

        UDP 1116=Lurker

        UDP 1122=Last 2000,Singularity

        UDP 1183=Cyn,SweetHeart

        UDP 1200=NoBackO

        UDP 1201=NoBackO

        UDP 1342=BLA trojan

        UDP 1344=Ptakks

        UDP 1349=BO dll

        UDP 1512=Microsoft Windows Internet Name Service

        UDP 1561=MuSka52

        UDP 1772=NetControle

        UDP 1801=Microsoft Meage Queue

        UDP 1978=Slapper

        UDP 1985=Black Diver

        UDP 2000=A-trojan,Fear,Force,GOTHIC Intruder,Last 2000,Real 2000

        UDP 2001=Scalper

        UDP 2002=Slapper

        UDP 2015=raid-cs

        UDP 2018=rellpack

        UDP 2130=Mini BackLash

        UDP 2140=Deep Throat,Foreplay,The Invasor

        UDP

        2222=SweetHeart,Way,Backdoor/Mifeng.t

        UDP 2234=DirectPlay

        UDP 2339=Voice Spy

        UDP 2702=Black Diver

        UDP 2989=RAT

        UDP 3074=Microsoft Xbox game port

        UDP 3132=Microsoft Busine Rule Engine Update Service

        UDP 3150=Deep Throat

        UDP 3215=XHX

        UDP 3268=Microsoft Global Catalog

        UDP 3269=Microsoft Global Catalog with LDAP/SSL

        UDP 3333=Daodan

        UDP 3535=Microsoft Cla Server

        UDP 3801=Eclypse

        UDP 3996=Remote Anything

        UDP 4128=RedShad

        UDP 4156=Slapper

        UDP 4350=Net Device

        UDP 4500=Microsoft IPsec NAT-T, sae-urn

        UDP 5419=DarkSky

        UDP 5503=Remote Shell Trojan

        UDP 5555=Daodan

        UDP 5678=Remote Replication Agent Connection

        UDP 5679=Direct Cable Connect Manager

        UDP 5720=Microsoft Licensing

        UDP 5882=Y3K RAT

        UDP 5888=Y3K RAT

        UDP 6073=DirectPlay8

        UDP 6112=Battle.net Game

        UDP 6666=KiLo

        UDP 6667=KiLo

        UDP 6766=KiLo

        UDP 6767=KiLo,UandMe

        UDP 6838=Mstream Agent-handler

        UDP 7028=未知木馬

        UDP 7424=Host Control

        UDP 7788=Singularity

        UDP 7983=MStream handler-agent

        UDP 8012=Ptakks

        UDP 8090=Aphex\\'s Remote Packet Sniffer

        UDP 8127=9_119,Chonker

        UDP 8488=KiLo

        UDP 8489=KiLo

        UDP 8787=BackOrifice 2000

        UDP 8879=BackOrifice 2000

        UDP 9325=MStream Agent-handler

        UDP 10000=XHX

        UDP 10067=Portal of Doom

        UDP 10084=Syphillis

        UDP 10100=Slapper

        UDP 10167=Portal of Doom UDP 10498=Mstream

        UDP 10666=Ambush

        UDP 11225=Cyn

        UDP 12321=Proto

        UDP 12345=BlueIce 2000

        UDP 12378=W32/Gibe@MM

        UDP 12623=ButtMan,DUN Control

        UDP 11320=IMIP Channels Port

        UDP 15210=UDP remote shell backdoor server

        UDP 15486=KiLo

        UDP 16514=KiLo

        UDP 16515=KiLo

        UDP 18753=Shaft handler to Agent

        UDP 20433=Shaft

        UDP 21554=GirlFriend

        UDP 22784=Backdoor.Intruzzo

        UDP 23476=Donald Dick

        UDP 25123=MOTD

        UDP 26274=Delta Source

        UDP 26374=Sub-7 2.1

        UDP 26444=Trin00/TFN2K

        UDP 26573=Sub-7 2.1

        UDP 27184=Alvgus trojan 2000

        UDP 27444=Trinoo

        UDP 29589=KiLo

        UDP 29891=The Unexplained

        UDP 30103=NetSphere

        UDP 31320=Little Witch

        UDP 31335=Trin00 DoS Attack

        UDP 31337=Baron Night, BO client, BO2, Bo Facil, BackFire, Back Orifice, DeepBO

        UDP 31338=Back Orifice, NetSpy DK, DeepBO

        UDP 31339=Little Witch

        UDP 31340=Little Witch

        UDP 31416=Lithium

        UDP 31787=Hack aTack

        UDP 31789=Hack aTack

        UDP 31790=Hack aTack

        UDP 31791=Hack aTack

        UDP 33390=未知木馬

        UDP 34555=Trinoo

        UDP 35555=Trinoo

        UDP 43720=KiLo

        UDP 44014=Iani

        UDP 44767=School Bus

        UDP 46666=Taskman

        UDP 47262=Delta Source

        UDP 47624=Direct Play Server

        UDP 47785=KiLo

        UDP 49301=OnLine keyLogger

        UDP 49683=Fenster

        UDP 49698=KiLo

        UDP 52901=Omega

        UDP 54320=Back Orifice

        UDP 54321=Back Orifice 2000

        UDP 54341=NetRaider Trojan

        UDP 61746=KiLO

        UDP 61747=KiLO

        UDP 61748=KiLO

        UDP 65432=The Traitor

        第三篇:配置ftp服務(wù)器

        ftp服務(wù)器配置

        1、檢查系統(tǒng)中是否已經(jīng)安裝vsftpd服務(wù)(廢話,有沒有自己不知道嗎) [root@localhost ~]# rpm -qa | grep vsftpd // 檢查系統(tǒng)中是否安裝vsftpd

        2、自動安裝vsftpd或者手動安裝

        [root@localhost ~]# yum -y install vsftpd //安裝vsftp軟件包

        [root@serverLI ~]# rpm -ivh /download/vsftpd-2.2.2-11.el6_4.1.i686.rpm //安裝vsftpd軟件包

        //rpm -i RPM軟件包

        安裝軟件包 //rpm -ivh RPM軟件包 安裝軟件包同時(shí)顯示安裝過程

        3、服務(wù)運(yùn)行管理

        [root@localhost ~]# service vsftpd status //status查看ftp服務(wù)狀態(tài)、start啟動服務(wù)、stop停止服務(wù)、restart重啟服務(wù)

        4、查看vsftpd配置文件

        [root@localhost ~]# grep -v "#" /etc/vsftpd/vsftpd.conf //去掉vsftpd.conf中的注釋行

        5、配置selinux [root@localhost ~]# getsebool -a | grep ftp //查看selinux中ftp的相關(guān)配置 allow_ftpd_anon_write --> off allow_ftpd_full_acce --> off allow_ftpd_use_cifs --> off allow_ftpd_use_nfs --> off ftp_home_dir --> off ftpd_connect_db --> off ftpd_use_paive_mode --> off httpd_enable_ftp_server --> off tftp_anon_write --> off [root@localhost ~]#

        [root@localhost ~]# setsebool ftp_home_dir 1 //設(shè)置ftp_home_dir狀態(tài)為on [root@localhost Desktop]# setsebool -P ftp_home_dir 1 //設(shè)置開機(jī)自動啟動

        6、關(guān)閉防火墻、及兩個常見故障

        [root@localhost Desktop]# service iptables stop //設(shè)置防火墻關(guān)閉,也可以通過iptables來配置

        C:\\\\Windows\\\\System32>ftp 192.168.1.9 ftp> ftp>

        //無法訪問ftp,原因?yàn)榉阑饓﹂_啟

        500 OOPS: cannot change directory:/home/zhujingzi //如果服務(wù)器上沒有設(shè)置selinux則會提示這個錯誤,設(shè)置selinux,ftp_home_dir=on

        ---------------------------到此處簡單的ftp算是設(shè)置完成,下面設(shè)置vsftpd下的虛擬用戶

        1、配置虛擬用戶名和密碼

        [root@localhost vsftpd]# touch ftpuser.txt //在vsftpd目錄下新建一個ftpuser.txt的文件,并不是.txt的文本文檔

        [root@localhost vsftpd]# vi ftpuser.txt //編輯ftpuser.txt,奇行為用戶名(虛擬)、偶行為密碼,如: ftptest 123456 book xxzz123

        2、生成DB文件并認(rèn)證

        [root@localhost Desktop]# yum install db4-utils //安裝db4-utils軟件包,注:db4-utils依賴db4軟件包

        #db4-4.7.25-18.el6_4.i686.rpm #db4-utils-4.7.25-18.el6_4.i686.rpm [root@serverLI download]# rpm -ivh db4-4.7.25-18.el6_4.i686.rpm //安裝db4軟件包

        [root@localhost ~]# db_load -T -t hash -f /etc/vsftpd/ftpuser.txt /etc/vsftpd/ftpuser.db

        //生成DB文件

        [root@localhost ~]# file /etc/vsftpd/vsftpd_login.db /etc/vsftpd/vsftpd_login.db: Berkeley DB (Hash, version 9, native byte-order) //生成的DB文件

        [root@localhost vsftpd]# ls -l -rw-r--r--.1 root root 12288 Apr 28 10:28 vsftpd_login.db [root@localhost vsftpd]# chmod 600 /etc/vsftpd/vsftpd_login.db //修改該文件的訪問權(quán)限 [root@localhost vsftpd]# ls -l /etc/vsftpd/vsftpd_login.db -rw-------.1 root root 12288 Apr 28 10:28 /etc/vsftpd/vsftpd_login.db

        [root@localhost pam.d]# vi vsftpd //添加認(rèn)證文件

        auth required /lib/security/pam_userdb.so db=/etc/vsftpd/ftpuser account required /lib/security/pam_userdb.so db=/etc/vsftpd/ftpuser

        3、修改vsftpd.conf配置文件 //配置vsftpd.conf文件,如下: anonymous_enable=NO

        //設(shè)定不允許匿名訪問 local_enable=YES

        //設(shè)定本地用戶可以訪問。注:如使用虛擬宿主用戶,在該項(xiàng)目設(shè)定為NO的情況下所有虛擬用戶將無法訪問

        chroot_list_enable=YES //使用戶不能離開主目錄 ascii_upload_enable=YES ascii_download_enable=YES //設(shè)定支持ASCII模式的上傳和下載功能

        pam_service_name=vsftpd //PAM認(rèn)證文件名,PAM將根據(jù)/etc/pam.d/vsftpd進(jìn)行認(rèn)證

        //并在vsftpd.conf下手工添加如下信息 guest_enable=YES //設(shè)定啟用虛擬用戶功能

        guest_username=ftp //指定虛擬用戶的宿主用戶,CentOS中已經(jīng)有內(nèi)置的ftp用戶

        user_config_dir=/etc/vsftpd/vuser_conf //設(shè)定虛擬用戶個人vsftp的CentOS FTP服務(wù)文件存放路徑。存放虛擬用戶個性的CentOS FTP服務(wù)文件(配置文件名=虛擬用戶名)

        4、設(shè)置ftp訪問目錄權(quán)限、配置虛擬用戶權(quán)限

        [root@localhost ~]# chmod 755 /ftp //修改訪問權(quán)限 [root@localhost ~]# chmod 777 /ftp/data //修改訪問權(quán)限

        配置虛擬用戶的訪問權(quán)限,編輯文件對應(yīng)的虛擬用戶名,在/etc/vsftpd/vuser_conf下面 local_root=/etc/vsftpd/ftp anon_world_readable_only=NO anon_upload_enable=YES anon_mkdir_write_enable=YES anon_other_write_enable=YES

        5、配置selinux、開機(jī)自動啟動vsftpd服務(wù)

        [root@localhost ~]# setsebool allow_ftpd_full_acce 1 //設(shè)置allow_ftpd_full_acce狀態(tài)為on [root@localhost Desktop]# setsebool -P allow_ftpd_full_acce 1 //設(shè)置開機(jī)自動啟動

        [root@localhost ~]# chkconfig vsftpd on //設(shè)置開機(jī)自動啟動vsftpd服務(wù)

        6、防火墻配置

        [root@localhost ~]#iptables -A INPUT -p tcp --dport 22 -j ACCEPT

        重啟vsfptd服務(wù)生效

        網(wǎng)址:http://puma08.com/yyws/kh/301551.html

        聲明:本文內(nèi)容由互聯(lián)網(wǎng)用戶自發(fā)貢獻(xiàn)自行上傳,本網(wǎng)站不擁有所有權(quán),未作人工編輯處理,也不承擔(dān)相關(guān)法律責(zé)任。如果您發(fā)現(xiàn)有涉嫌版權(quán)的內(nèi)容,歡迎發(fā)送郵件至89702570@qq.com 進(jìn)行舉報(bào),并提供相關(guān)證據(jù),工作人員會在5個工作日內(nèi)聯(lián)系你,一經(jīng)查實(shí),本站將立刻刪除涉嫌侵權(quán)內(nèi)容。