千文網(wǎng)小編為你整理了多篇相關(guān)的《ssl端口號共(大全)》,但愿對你工作學(xué)習(xí)有幫助,當(dāng)然你在千文網(wǎng)還可以找到更多《ssl端口號共(大全)》。
第一篇:SSL實(shí)驗(yàn)報(bào)告
搭建證書服務(wù)器
步驟:
1、登陸Windows Server 2008服務(wù)器
2、打開【服務(wù)器管理器】
3、點(diǎn)擊【添加角色】,之后點(diǎn)擊【下一步】
4、找到【Active Directory證書服務(wù)】勾選此選項(xiàng),之后點(diǎn)擊【下一步】;
5、進(jìn)入證書服務(wù)簡介界面,點(diǎn)擊【下一步】
6、將證書頒發(fā)機(jī)構(gòu)、證書頒發(fā)機(jī)構(gòu)WEB注冊勾選上,然后點(diǎn)擊【下一步】
7、勾選【獨(dú)立】選項(xiàng),點(diǎn)擊【下一步】(由于不在域管理中創(chuàng)建,直接默認(rèn)為:“獨(dú)立”)
8、首次創(chuàng)建,勾選【根CA】,之后點(diǎn)擊【下一步】
9、首次創(chuàng)建勾選【新建私鑰】,之后點(diǎn)擊【下一步】;
10、默認(rèn),繼續(xù)點(diǎn)擊【下一步】;
11、默認(rèn),繼續(xù)點(diǎn)擊【下一步】
12、默認(rèn),繼續(xù)點(diǎn)擊【下一步】
13、默認(rèn),繼續(xù)點(diǎn)擊【下一步】
14、點(diǎn)擊【安裝】
15、點(diǎn)擊【關(guān)閉】,證書服務(wù)器安裝完成
搭建WEB服務(wù)器端SSL證書應(yīng)用
步驟:
1、打開IIS,WEB服務(wù)器,找到【服務(wù)器證書】并選中
2、點(diǎn)擊【服務(wù)器證書】,找到【創(chuàng)建證書申請】項(xiàng)
3、單擊【創(chuàng)建證書申請】,打開【創(chuàng)建證書申請】后,填寫相關(guān)文本框,“通用名稱”必需填寫本機(jī)IP(192.168.72.128),單擊【下一步】
4、默認(rèn),點(diǎn)擊【下一步】
5、選擇并填寫需要生成文件的保存路徑與文件名, 此文件后期將會被使用;(保存位置、文件名可以自行設(shè)定),之后點(diǎn)擊【完成】,此配置完成,子界面會關(guān)閉
6、接下來,點(diǎn)擊IE(瀏覽器),訪問:http://192.168.72.128/certsrv/(本機(jī)ip)此時(shí)會出現(xiàn)證書服務(wù)頁面;點(diǎn)擊【申請證書】,進(jìn)入下一界面點(diǎn)擊【高級證書申請】,進(jìn)入下一界面點(diǎn)擊【創(chuàng)建并向此CA提交一個申請】,進(jìn)入下一界面,此時(shí)會彈出一個提示窗口:“為了完成證書注冊,必須將該CA的網(wǎng)站配置為使用HTTPS身份驗(yàn)證”;也就是必須將HTTP網(wǎng)站配置為HTTPS的網(wǎng)站,才能正常訪問當(dāng)前網(wǎng)頁及功能
7、搭建HTTPS的網(wǎng)站:
方法:打開IE(瀏覽器),找到工具欄,點(diǎn)擊【工具欄】,找到它下面的【Internet選項(xiàng)】;
、點(diǎn)擊【Internet選項(xiàng)】->點(diǎn)擊【安全】->點(diǎn)擊【可信站點(diǎn)】;
10、點(diǎn)擊【可信站點(diǎn)】,并輸入之前的證書網(wǎng)站地址:http://192.168.72.128/certsrv,并將其【添加】到信任站點(diǎn)中;添加完后,點(diǎn)擊【關(guān)閉】,關(guān)閉子界面
11、接下來,繼續(xù)在【可信站點(diǎn)】位置點(diǎn)擊【自定義級別】,此時(shí)會彈出一個【安全設(shè)置】子界面,在安全設(shè)置界面中拖動右別的滾動條,找到【對未標(biāo)記為可安全執(zhí)行腳本的ActiveX控件初始化并執(zhí)行腳本】選項(xiàng),將選為【啟用】;之后點(diǎn)擊所有【確定】操作,直到【Internet選項(xiàng)】子界面關(guān)閉為止
12、完成上面操作后,先將IE關(guān)閉,然后重新打開,輸入:http://192.168.72.128/certsrv;頁面出來后點(diǎn)擊【申請證書】,【高級證書申請】,【使用base64編碼的CMC或PKCS#10文件提交一個證書申請,或使用Base64編碼的PKCS#7文件續(xù)訂證書申請】
13、將之前保存的密鑰文檔文件找到并打開,將里面的文本信息復(fù)制并粘貼到“Base-64編碼的證書申請”文本框中;確定文本內(nèi)容無誤后,點(diǎn)擊【提交】
14、此時(shí)可以看到提交信息,申請已經(jīng)提交給證書服務(wù)器,關(guān)閉當(dāng)前IE
15、打開證書服務(wù)器處理用戶剛才提交的證書申請; 回到Windows【桌面】->點(diǎn)擊【開始】->點(diǎn)擊【運(yùn)行】,在運(yùn)行位置輸入:certsrv.msc,然后回車就會打開證書服務(wù)功能界面;
打開后,找到【掛起的申請】位置,可以看到之前提交的證書申請;
(圖17)
18、點(diǎn)擊鼠標(biāo)右鍵會出現(xiàn)【所有任務(wù)】,點(diǎn)擊【所有任務(wù)】->點(diǎn)擊【頒發(fā)】將掛起的證書申請審批通過,此時(shí)掛起的證書會從當(dāng)前界面消失,即代表已完成操作
19、點(diǎn)擊【頒發(fā)的證書】,可以看到新老已審批通過的證書
20、重新打開IE,輸入之前的網(wǎng)址:http://192.168.72.128/certsrv/; 打開頁面后,可點(diǎn)擊【查看掛起的證書申請的狀態(tài)】;之后會進(jìn)入“查看掛起的證書申請的狀態(tài)”頁面,點(diǎn)擊【保存的申請證書】;
21、進(jìn)入新頁面后,勾選Base 64編碼,然后點(diǎn)擊【下載證書】,將已申請成功的證書保存到指定位置,后續(xù)待用;
22、打開IIS服務(wù)器,點(diǎn)擊【服務(wù)器證書】->【完成證書申請】->選擇剛保存的證書,然后在“好記名稱”文本框中輸入自定義的名稱,完后點(diǎn)擊【確定】
23、上述操作完后,可在“服務(wù)器證書”界面下看到證書
24、點(diǎn)擊左邊的【Default Web Site】菜單,然后找到【綁定】功能,點(diǎn)擊【綁定】功能,會彈出【網(wǎng)站綁定】界面,默認(rèn)會出現(xiàn)一個類型為http,端口為80的主機(jī)服務(wù),然后點(diǎn)擊【添加】,會彈出【添加網(wǎng)站綁定】界面,在此界面中選擇“類型:https”、“SSL證書:JZT_TEST1”,然后點(diǎn)【確定】;點(diǎn)完確定后,會看到【網(wǎng)站綁定】子界面中有剛配的HTTPS服務(wù),點(diǎn)擊【關(guān)閉】,子界面消失
25、點(diǎn)擊左菜單上的【CertSrv】證書服務(wù)網(wǎng)站,然后點(diǎn)擊【SSL設(shè)置】
26、進(jìn)入SSL設(shè)置頁面,勾選上“要求SSL”即啟用SSL功能,然后點(diǎn)擊【應(yīng)用】,保存設(shè)置
27、打開IE,再次輸入:https://192.168.70.128
第二篇:知名端口號
知名端口號
//注: 由于一些應(yīng)用軟件占用了部分端口, 因此此文件中的部分端口被注釋掉了(注釋字符為: //)
TCP 1=TCP Port Service Multiplexer
TCP 2=Death
TCP 5=Remote Job Entry,yoyo
TCP 7=Echo
TCP 11=Skun
TCP 12=Bomber
TCP 16=Skun
TCP 17=Skun
TCP 18=消息傳輸協(xié)議,skun
TCP 19=Skun
TCP 20=FTP Data,Amanda
TCP 21=文件傳輸,Back Construction,Blade Runner,Doly Trojan,Fore,FTP trojan,Invisible FTP,Larva, WebEx,WinCrash
TCP 22=遠(yuǎn)程登錄協(xié)議
TCP 23=遠(yuǎn)程登錄(Telnet),Tiny Telnet Server (= TTS)
TCP 25=電子郵件(SMTP),Ajan,Antigen,Email Paword Sender,Happy 99,Kuang2,ProMail trojan,Shtrilitz,Stealth,Tapiras,Terminator,WinPC,WinSpy,Haebu Coceda
TCP 27=Aasin
TCP 28=Amanda
TCP 29=MSG ICP
TCP 30=Agent 40421
TCP 31=Agent 31,Hackers Paradise,Masters Paradise,Agent 40421
TCP 37=Time,ADM worm
TCP 39=SubSARI
TCP 41=DeepThroat,Foreplay
TCP 42=Host Name Server
TCP 43=WHOIS
TCP 44=Arctic
TCP 48=DRAT
TCP 49=主機(jī)登錄協(xié)議
TCP 50=DRAT
TCP 51=IMP Logical Addre Maintenance,Fuck Lamers Backdoor
TCP 52=MuSka52,Skun
TCP 53=DNS,Bonk (DOS Exploit)
TCP 54=MuSka52
TCP 58=DMSetup
TCP 59=DMSetup
TCP 63=whois++
TCP 64=communications Integrator
TCP 65=TACACS-Database Service
TCP 66=Oracle SQL*NET,AL-Bareki
TCP 67=Bootstrap Protocol Server
TCP 68=Bootstrap Protocol Client
TCP 69=W32.Evala.Worm,BackGate Kit,Nimda,Pasana,Storm,Storm worm,Theef,Worm.Cycle.a
TCP 70=Gopher服務(wù),ADM worm
TCP 79=用戶查詢
(Finger),Firehotcker,ADM worm
TCP 80=超文本服務(wù)器(Http),Executor,RingZero
TCP 81=Chubo,Worm.Bbeagle.q
TCP 82=Netsky-Z
TCP 88=Kerberos krb5服務(wù)
TCP 99=Hidden Port
TCP 102=消息傳輸代理
TCP 108=SNA網(wǎng)關(guān)訪問服務(wù)器
TCP 109=Pop2
TCP 110=電子郵件(Pop3),ProMail
TCP 113=Kazimas, Auther Idnet
TCP 115=簡單文件傳輸協(xié)議
TCP 118=SQL Services, Infector 1.4.2
TCP 119=新聞組傳輸協(xié)議(Newsgroup(Nntp)), Happy 99
TCP 121=JammerKiller, Bo jammerkillah
TCP 123=網(wǎng)絡(luò)時(shí)間協(xié)議(NTP),Net Controller
TCP 129=Paword Generator Protocol
TCP 133=Infector 1.x
TCP 135=微軟DCE RPC end-point mapper服務(wù)
TCP 137=微軟Netbios Name服務(wù)(網(wǎng)上鄰居傳輸文件使用)
TCP 138=微軟Netbios Name服務(wù)(網(wǎng)上鄰居傳輸文件使用)
TCP 139=微軟Netbios Name服務(wù)(用于文件及打印機(jī)共享)
TCP 142=NetTaxi
TCP 143=IMAP
TCP 146=FC Infector,Infector
TCP 150=NetBIOS Seion Service
TCP 156=SQL服務(wù)器
TCP 161=Snmp
TCP 162=Snmp-Trap
TCP 170=A-Trojan
TCP 177=X Display管理控制協(xié)議
TCP 179=Border網(wǎng)關(guān)協(xié)議(BGP)
TCP 190=網(wǎng)關(guān)訪問控制協(xié)議(GACP)
TCP 194=Irc
TCP 197=目錄定位服務(wù)(DLS)
TCP 256=Nirvana
TCP 315=The Invasor
TCP 371=ClearCase版本管理軟件
TCP 389=Lightweight Directory Acce Protocol (LDAP)
TCP 396=Novell Netware over IP
TCP 420=Breach
TCP 421=TCP Wrappers
TCP 443=安全服務(wù)
TCP 444=Simple Network Paging Protocol(SNPP)
TCP 445=Microsoft-DS
TCP 455=Fatal Connections
TCP 456=Hackers paradise,FuseSpark
TCP 458=蘋果公司QuickTime
TCP 513=Grlogin
TCP 514=RPC Backdoor
TCP 520=Rip
TCP 531=Rasmin,Net666
TCP 544=kerberos kshell
TCP 546=DHCP Client
TCP 547=DHCP Server
TCP 548=Macintosh文件服務(wù)
TCP 555=Ini-Killer,Phase Zero,Stealth Spy
TCP 569=MSN
TCP 605=SecretService
TCP 606=Noknok8
TCP 660=DeepThroat
TCP 661=Noknok8
TCP 666=Attack FTP,Satanz Backdoor,Back Construction,Dark Connection Inside 1.2
TCP 667=Noknok7.2
TCP 668=Noknok6
TCP 669=DP trojan
TCP 692=GayOL
TCP 707=Welchia,nachi
TCP 777=AIM Spy
TCP 808=RemoteControl,WinHole
TCP 815=Everyone Darling
TCP 901=Backdoor.Devil
TCP 911=Dark Shadow
TCP 993=IMAP
TCP 999=DeepThroat
TCP 1000=Der Spaeher
TCP 1001=Silencer,WebEx,Der Spaeher
TCP 1003=BackDoor
TCP 1010=Doly
TCP 1011=Doly
TCP 1012=Doly
TCP 1015=Doly
TCP 1016=Doly
TCP 1020=Vampire
TCP 1023=Worm.Saer.e
TCP 1024=NetSpy.698(YAI)
TCP 1059=nimreg
//TCP 1025=NetSpy.698,Unused Windows Services Block
//TCP 1026=Unused Windows Services Block
//TCP 1027=Unused Windows Services Block
TCP 1028=應(yīng)用層網(wǎng)關(guān)服務(wù)
//TCP 1029=Unused Windows Services Block
//TCP 1030=Unused Windows Services Block
//TCP 1033=Netspy
//TCP 1035=Multidropper
//TCP 1042=Bla
//TCP 1045=Rasmin
//TCP 1047=GateCrasher
//TCP 1050=Minicommand
TCP 1058=nim
TCP 1069=Backdoor.TheefServer.202
TCP 1070=Voice,Psyber Stream Server,Streaming Audio Trojan
TCP 1079=ASPROVATalk
TCP
1080=Wingate,Worm.BugBear.B,Worm.Novarg.B
//TCP 1090=Xtreme, VDOLive
//TCP 1092=LoveGate
//TCP 1095=Rat
//TCP 1097=Rat
//TCP 1098=Rat
//TCP 1099=Rat
TCP 1109=Pop with Kerberos
TCP 1110=nfsd-keepalive
TCP 1111=Backdoor.AIMVision
TCP 1155=Network File Acce
//TCP 1170=Psyber Stream
Server,Streaming Audio trojan,Voice
//TCP 1200=NoBackO
//TCP 1201=NoBackO
//TCP 1207=Softwar
//TCP 1212=Nirvana,Visul Killer
//TCP 1234=Ultors
//TCP 1243=BackDoor-G, SubSeven, SubSeven Apocalypse
//TCP 1245=VooDoo Doll
//TCP 1269=Mavericks Matrix
TCP 1270=Microsoft Operations Manager
//TCP 1313=Nirvana
//TCP 1349=BioNet
TCP 1352=Lotus Notes
TCP 1433=Microsoft SQL Server
TCP 1434=Microsoft SQL Monitor
//TCP 1441=Remote Storm
//TCP
1492=FTP99CMP(BackOriffice.FTP)
TCP 1503=NetMeeting T.120
TCP 1512=Microsoft Windows Internet Name Service
//TCP 1509=Psyber Streaming Server
TCP 1570=Orbix Daemon
//TCP 1600=Shivka-Burka
//TCP 1703=Exloiter 1.1
TCP 1720=NetMeeting H.233 call Setup
TCP 1731=NetMeeting音頻調(diào)用控制
TCP 1745=ISA Server proxy autoconfig, Remote Winsock
TCP 1801=Microsoft Meage Queue
//TCP 1807=SpySender
TCP 1906=Backdoor/Verify.b
TCP 1907=Backdoor/Verify.b
//TCP 1966=Fake FTP 2000
//TCP 1976=Custom port
//TCP 1981=Shockrave
TCP 1990=stun-p1 cisco STUN Priority 1 port
TCP 1990=stun-p1 cisco STUN Priority 1 port
TCP 1991=stun-p2 cisco STUN Priority 2 port
TCP 1992=stun-p3 cisco STUN Priority 3 port,ipsendmsg IPsendmsg
TCP 1993=snmp-tcp-port cisco SNMP TCP port
TCP 1994=stun-port cisco serial tunnel port
TCP 1995=perf-port cisco perf port
TCP 1996=tr-rsrb-port cisco Remote SRB port
TCP 1997=gdp-port cisco Gateway Discovery Protocol
TCP 1998=x25-svc-port cisco X.25 service (XOT)
//TCP 1999=BackDoor, TransScout
//TCP 2000=Der Spaeher,INsane Network
TCP 2002=W32.Beagle.AX @mm
//TCP 2001=Transmion scout
//TCP 2002=Transmion scout
//TCP 2003=Transmion scout
//TCP 2004=Transmion scout
//TCP 2005=TTransmion scout
TCP 2011=cypre
TCP 2015=raid-cs
//TCP 2023=Ripper,Pa Ripper,Hack City Ripper Pro
TCP 2049=NFS
//TCP 2115=Bugs
//TCP 2121=Nirvana
//TCP 2140=Deep Throat, The Invasor
//TCP 2155=Nirvana
//TCP 2208=RuX
TCP 2234=DirectPlay
//TCP 2255=Illusion Mailer
//TCP 2283=HVL Rat5
//TCP 2300=PC Explorer
//TCP 2311=Studio54
TCP 2556=Worm.Bbeagle.q
//TCP 2565=Striker
//TCP 2583=WinCrash
//TCP 2600=Digital RootBeer
//TCP 2716=Prayer Trojan
TCP 2745=Worm.BBeagle.k
//TCP 2773=Backdoor,SubSeven
//TCP 2774=SubSeven2.1&2.2
//TCP 2801=Phineas Phucker
TCP 2967=SSC Agent
//TCP 2989=Rat
//TCP 3024=WinCrash trojan
TCP 3074=Microsoft Xbox game port
TCP 3127=Worm.Novarg
TCP 3128=RingZero,Worm.Novarg.B
//TCP 3129=Masters Paradise
TCP 3132=Microsoft Busine Rule Engine Update Service
//TCP 3150=Deep Throat, The Invasor
TCP 3198=Worm.Novarg
//TCP 3210=SchoolBus
TCP 3268=Microsoft Global Catalog
TCP 3269=Microsoft Global Catalog with LDAP/SSL
TCP 3332=Worm.Cycle.a
TCP 3333=Prosiak
TCP 3535=Microsoft Cla Server
TCP 3389=超級終端
//TCP 3456=Terror
//TCP 3459=Eclipse 2000
//TCP 3700=Portal of Doom
//TCP 3791=Eclypse
//TCP 3801=Eclypse
TCP 3847=Microsoft Firewall Control
TCP 3996=Portal of Doom,RemoteAnything
TCP 4000=騰訊QQ客戶端
TCP 4060=Portal of Doom,RemoteAnything
TCP 4092=WinCrash
TCP 4242=VHM
TCP 4267=SubSeven2.1&2.2
TCP 4321=BoBo
TCP 4350=Net Device
TCP 4444=Prosiak,Swift remote
TCP 4500=Microsoft IPsec NAT-T, W32.HLLW.Tufas
TCP 4567=File Nail
TCP 4661=Backdoor/Surila.f
TCP 4590=ICQTrojan
TCP 4899=Remote Administrator服務(wù)器
TCP 4950=ICQTrojan
TCP 5000=WindowsXP服務(wù)器,Blazer
5,Bubbel,Back Door Setup,Sockets de Troie
TCP 5001=Back Door Setup, Sockets de Troie
TCP 5002=cd00r,Shaft
TCP 5011=One of the Last Trojans (OOTLT)
TCP 5025=WM Remote KeyLogger
TCP
5031=Firehotcker,Metropolitan,NetMetro
TCP 5032=Metropolitan
TCP 5190=ICQ Query
TCP 5321=Firehotcker
TCP 5333=Backage Trojan Box 3
TCP 5343=WCrat
TCP 5400=Blade Runner, BackConstruction1.2
TCP 5401=Blade Runner,Back Construction
TCP 5402=Blade Runner,Back Construction
TCP 5471=WinCrash
TCP 5512=Illusion Mailer
TCP 5521=Illusion Mailer
TCP 5550=Xtcp,INsane Network
TCP 5554=Worm.Saer
TCP 5555=ServeMe
TCP 5556=BO Facil
TCP 5557=BO Facil
TCP 5569=Robo-Hack
TCP 5598=BackDoor 2.03
TCP 5631=PCAnyWhere data
TCP 5632=PCAnyWhere
TCP 5637=PC Crasher
TCP 5638=PC Crasher
TCP 5678=Remote Replication Agent Connection
TCP 5679=Direct Cable Connect Manager
TCP 5698=BackDoor
TCP 5714=Wincrash3
TCP 5720=Microsoft Licensing
TCP 5741=WinCrash3
TCP 5742=WinCrash
TCP 5760=Portmap Remote Root Linux Exploit
TCP 5880=Y3K RAT
TCP 5881=Y3K RAT
TCP 5882=Y3K RAT
TCP 5888=Y3K RAT
TCP 5889=Y3K RAT
TCP 5900=WinVnc
TCP 6000=Backdoor.AB
TCP 6006=Noknok8
TCP 6073=DirectPlay8
TCP 6129=Dameware Nt Utilities服務(wù)器
TCP 6272=SecretService
TCP 6267=廣外女生
TCP 6400=Backdoor.AB,The Thing
TCP 6500=Devil 1.03
TCP 6661=Teman
TCP 6666=TCPshell.c
TCP 6667=NT Remote Control,Wise 播放器接收端口
TCP 6668=Wise Video廣播端口
TCP 6669=Vampyre
TCP 6670=DeepThroat,iPhone
TCP 6671=Deep Throat 3.0
TCP 6711=SubSeven
TCP 6712=SubSeven1.x
TCP 6713=SubSeven
TCP 6723=Mstream
TCP 6767=NT Remote Control
TCP 6771=DeepThroat
TCP 6776=BackDoor-G,SubSeven,2000 Cracks
TCP 6777=Worm.BBeagle
TCP 6789=Doly Trojan
TCP 6838=Mstream
TCP 6883=DeltaSource
TCP 6912=Shit Heep
TCP 6939=Indoctrination
TCP 6969=GateCrasher, Priority, IRC 3
TCP 6970=RealAudio,GateCrasher
TCP 7000=Remote Grab,NetMonitor,SubSeven1.x
TCP 7001=Freak88, Weblogic默認(rèn)端口
TCP 7201=NetMonitor
TCP 7215=BackDoor-G, SubSeven
TCP 7001=Freak88,Freak2k
TCP 7300=NetMonitor
TCP 7301=NetMonitor
TCP 7306=NetMonitor,NetSpy 1.0
TCP 7307=NetMonitor, ProcSpy
TCP 7308=NetMonitor, X Spy
TCP 7323=Sygate服務(wù)器端
TCP 7424=Host Control
TCP 7511=聰明基因
TCP 7597=Qaz
TCP 7609=Snid X2
TCP 7626=冰河
TCP 7777=The Thing
TCP 7789=Back Door Setup, ICQKiller
TCP 7983=Mstream
TCP 8000=騰訊OICQ服務(wù)器端,XDMA
TCP 8010=Wingate,Logfile
TCP 8011=WAY2.4
TCP 8080=WWW 代理(如:Tomcat的默認(rèn)端口),Ring Zero,Chubo,Worm.Novarg.B
TCP 8102=網(wǎng)絡(luò)神偷
TCP 8181=W32.Erkez.D@mm
TCP 8520=W32.Socay.Worm
TCP 8594=I-Worm/Bozori.a
TCP 8787=BackOfrice 2000
TCP 8888=Winvnc
TCP 8897=Hack Office,Armageddon
TCP 8989=Recon
TCP 9000=Netministrator
TCP 9080=WebSphere
TCP 9325=Mstream
TCP 9400=Incommand 1.0
TCP 9401=Incommand 1.0
TCP 9402=Incommand 1.0
TCP 9535=Remote Man Server
TCP 9872=Portal of Doom
TCP 9873=Portal of Doom
TCP 9874=Portal of Doom
TCP 9875=Portal of Doom
TCP 9876=Cyber Attacker
TCP 9878=TransScout
TCP 9989=Ini-Killer
TCP 9898=Worm.Win32.Dabber.a
TCP 9999=Prayer Trojan
TCP 10067=Portal of Doom
TCP 10080=Worm.Novarg.B
TCP 10084=Syphillis
TCP 10085=Syphillis
TCP 10086=Syphillis
TCP 10101=BrainSpy
TCP 10167=Portal Of Doom
TCP
10168=Worm.Supnot.78858.c,Worm.LovGate.T
TCP 10520=Acid Shivers
TCP 10607=coma trojan
TCP 10666=Ambush
TCP 11000=Senna Spy
TCP 11050=Host Control
TCP 11051=Host Control
TCP 11223=Progenic,Hack \\'99KeyLogger
TCP 11320=IMIP Channels Port
TCP 11831=TROJ_LATINUS.SVR
TCP 12076=Gjamer, MSH.104b
TCP 12223=Hack\\'99 KeyLogger
TCP 12345=GabanBus, NetBus 1.6/1.7, Pie Bill Gates, X-bill
TCP 12346=GabanBus, NetBus 1.6/1.7, X-bill
TCP 12349=BioNet
TCP 12361=Whack-a-mole
TCP 12362=Whack-a-mole
TCP 12363=Whack-a-mole
TCP 12378=W32/Gibe@MM
TCP 12456=NetBus
TCP 12623=DUN Control
TCP 12624=Buttman
TCP 12631=WhackJob, WhackJob.NB1.7
TCP 12701=Eclipse2000
TCP 12754=Mstream
TCP 13000=Senna Spy
TCP 13010=Hacker Brazil
TCP 13013=Psychward
TCP 13223=Tribal Voice的聊天程序PowWow
TCP 13700=Kuang2 The Virus
TCP 14456=Solero
TCP 14500=PC Invader
TCP 14501=PC Invader
TCP 14502=PC Invader
TCP 14503=PC Invader
TCP 15000=NetDaemon 1.0
TCP 15092=Host Control
TCP 15104=Mstream
TCP 16484=Mosucker
TCP 16660=Stacheldraht (DDoS)
TCP 16772=ICQ Revenge
TCP 16959=Priority
TCP 16969=Priority
TCP 17027=提供廣告服務(wù)的Conducent\\\"adbot\\\"共享軟件
TCP 17166=Mosaic
TCP 17300=Kuang2 The Virus
TCP 17490=CrazyNet
TCP 17500=CrazyNet
TCP 17569=Infector 1.4.x + 1.6.x
TCP 17777=Nephron
TCP 18753=Shaft (DDoS)
TCP 19191=藍(lán)色火焰
TCP 19864=ICQ Revenge
TCP 20000=Millennium II (GrilFriend)
TCP 20001=Millennium II (GrilFriend)
TCP 20002=AcidkoR
TCP 20034=NetBus 2 Pro
TCP 20168=Lovgate
TCP 20203=Logged,Chupacabra
TCP 20331=Bla
TCP 20432=Shaft (DDoS)
TCP 20808=Worm.LovGate.v.QQ
TCP 21335=Tribal Flood Network,Trinoo
TCP 21544=Schwindler 1.82,GirlFriend
TCP 21554=Schwindler
1.82,GirlFriend,Exloiter 1.0.1.2
TCP 22222=Prosiak,RuX Uploader 2.0
TCP 22784=Backdoor.Intruzzo
TCP 23432=Asylum 0.1.3
TCP 23444=網(wǎng)絡(luò)公牛
TCP 23456=Evil FTP, Ugly FTP, WhackJob
TCP 23476=Donald Dick
TCP 23477=Donald Dick
TCP 23777=INet Spy
TCP 26274=Delta
TCP 26681=Spy Voice
TCP 27374=Sub Seven 2.0+, Backdoor.Baste
TCP 27444=Tribal Flood Network,Trinoo
TCP 27665=Tribal Flood Network,Trinoo
TCP 29431=Hack Attack
TCP 29432=Hack Attack
TCP 29104=Host Control
TCP 29559=TROJ_LATINUS.SVR
TCP 29891=The Unexplained
TCP 30001=Terr0r32
TCP 30003=Death,Lamers Death
TCP 30029=AOL trojan
TCP 30100=NetSphere 1.27a,NetSphere 1.31
TCP 30101=NetSphere 1.31,NetSphere 1.27a
TCP 30102=NetSphere 1.27a,NetSphere 1.31
TCP 30103=NetSphere 1.31
TCP 30303=Sockets de Troie
TCP 30722=W32.Esbot.A
TCP 30947=Intruse
TCP 30999=Kuang2
TCP 31336=Bo Whack
TCP 31337=Baron Night,BO
client,BO2,Bo Facil,BackFire,Back Orifice,DeepBO,Freak2k,NetSpy
TCP 31338=NetSpy,Back Orifice,DeepBO
TCP 31339=NetSpy DK
TCP 31554=Schwindler
TCP 31666=BOWhack
TCP 31778=Hack Attack
TCP 31785=Hack Attack
TCP 31787=Hack Attack
TCP 31789=Hack Attack
更新時(shí)間: 2007年8月6日
TCP 31791=Hack Attack
TCP 31792=Hack Attack
TCP 32100=PeanutBrittle
TCP 32418=Acid Battery
TCP 33333=Prosiak,Blakharaz 1.0
TCP 33577=Son Of Psychward
TCP 33777=Son Of Psychward
TCP 33911=Spirit 2001a
TCP 34324=BigGluck,TN,Tiny Telnet Server
TCP 34555=Trin00 (Windows) (DDoS)
TCP 35555=Trin00 (Windows) (DDoS)
TCP 36794=Worm.Bugbear-A
TCP 37651=YAT
TCP 40412=The Spy
TCP 40421=Agent 40421,Masters Paradise.96
TCP 40422=Masters Paradise
TCP 40423=Masters Paradise.97
TCP 40425=Masters Paradise
TCP 40426=Masters Paradise 3.x
TCP 41666=Remote Boot
TCP 43210=Schoolbus 1.6/2.0
TCP 44444=Delta Source
TCP 44445=Happypig
TCP 45576=未知代理
TCP 47252=Prosiak
TCP 47262=Delta
TCP 47624=Direct Play Server
TCP 47878=BirdSpy2
TCP 49301=Online Keylogger
TCP 50505=Sockets de Troie
TCP 50766=Fore, Schwindler
TCP 51966=CafeIni
TCP 53001=Remote Windows Shutdown
TCP 53217=Acid Battery 2000
TCP 54283=Back Door-G, Sub7
TCP 54320=Back Orifice 2000,Sheep
TCP 54321=School Bus .69-1.11,Sheep, BO2K
TCP 57341=NetRaider
TCP 58008=BackDoor.Tron
TCP 58009=BackDoor.Tron
TCP 58339=ButtFunnel
TCP 59211=BackDoor.DuckToy
TCP 60000=Deep Throat
TCP 60068=Xzip 6000068
TCP 60411=Connection
TCP 60606=TROJ_BCKDOR.G2.A
TCP 61466=Telecommando
TCP 61603=Bunker-kill
TCP 63485=Bunker-kill
TCP 65000=Devil, DDoS
TCP 65432=Th3tr41t0r, The Traitor
TCP 65530=TROJ_WINMITE.10
TCP 65535=RC,Adore Worm/Linux
TCP 69123=ShitHeep
TCP 88798=Armageddon,Hack Office
UDP 1=Sockets des Troie
UDP 9=Chargen
UDP 19=Chargen
UDP 69=Pasana
UDP 80=Penrox
UDP 371=ClearCase版本管理軟件
UDP 445=公共Internet文件系統(tǒng)(CIFS)
UDP 500=Internet密鑰交換
UDP 1025=Maverick\\'s Matrix 1.2 - 2.0
UDP 1026=Remote Explorer 2000
UDP 1027=HP服務(wù),UC聊天軟件,Trojan.Huigezi.e
UDP 1028=應(yīng)用層網(wǎng)關(guān)服務(wù),KiLo,SubSARI
UDP 1029=SubSARI
UDP 1031=Xot
UDP 1032=Akosch4
UDP 1104=RexxRave
UDP 1111=Daodan
UDP 1116=Lurker
UDP 1122=Last 2000,Singularity
UDP 1183=Cyn,SweetHeart
UDP 1200=NoBackO
UDP 1201=NoBackO
UDP 1342=BLA trojan
UDP 1344=Ptakks
UDP 1349=BO dll
UDP 1512=Microsoft Windows Internet Name Service
UDP 1561=MuSka52
UDP 1772=NetControle
UDP 1801=Microsoft Meage Queue
UDP 1978=Slapper
UDP 1985=Black Diver
UDP 2000=A-trojan,Fear,Force,GOTHIC Intruder,Last 2000,Real 2000
UDP 2001=Scalper
UDP 2002=Slapper
UDP 2015=raid-cs
UDP 2018=rellpack
UDP 2130=Mini BackLash
UDP 2140=Deep Throat,Foreplay,The Invasor
UDP
2222=SweetHeart,Way,Backdoor/Mifeng.t
UDP 2234=DirectPlay
UDP 2339=Voice Spy
UDP 2702=Black Diver
UDP 2989=RAT
UDP 3074=Microsoft Xbox game port
UDP 3132=Microsoft Busine Rule Engine Update Service
UDP 3150=Deep Throat
UDP 3215=XHX
UDP 3268=Microsoft Global Catalog
UDP 3269=Microsoft Global Catalog with LDAP/SSL
UDP 3333=Daodan
UDP 3535=Microsoft Cla Server
UDP 3801=Eclypse
UDP 3996=Remote Anything
UDP 4128=RedShad
UDP 4156=Slapper
UDP 4350=Net Device
UDP 4500=Microsoft IPsec NAT-T, sae-urn
UDP 5419=DarkSky
UDP 5503=Remote Shell Trojan
UDP 5555=Daodan
UDP 5678=Remote Replication Agent Connection
UDP 5679=Direct Cable Connect Manager
UDP 5720=Microsoft Licensing
UDP 5882=Y3K RAT
UDP 5888=Y3K RAT
UDP 6073=DirectPlay8
UDP 6112=Battle.net Game
UDP 6666=KiLo
UDP 6667=KiLo
UDP 6766=KiLo
UDP 6767=KiLo,UandMe
UDP 6838=Mstream Agent-handler
UDP 7028=未知木馬
UDP 7424=Host Control
UDP 7788=Singularity
UDP 7983=MStream handler-agent
UDP 8012=Ptakks
UDP 8090=Aphex\\'s Remote Packet Sniffer
UDP 8127=9_119,Chonker
UDP 8488=KiLo
UDP 8489=KiLo
UDP 8787=BackOrifice 2000
UDP 8879=BackOrifice 2000
UDP 9325=MStream Agent-handler
UDP 10000=XHX
UDP 10067=Portal of Doom
UDP 10084=Syphillis
UDP 10100=Slapper
UDP 10167=Portal of Doom UDP 10498=Mstream
UDP 10666=Ambush
UDP 11225=Cyn
UDP 12321=Proto
UDP 12345=BlueIce 2000
UDP 12378=W32/Gibe@MM
UDP 12623=ButtMan,DUN Control
UDP 11320=IMIP Channels Port
UDP 15210=UDP remote shell backdoor server
UDP 15486=KiLo
UDP 16514=KiLo
UDP 16515=KiLo
UDP 18753=Shaft handler to Agent
UDP 20433=Shaft
UDP 21554=GirlFriend
UDP 22784=Backdoor.Intruzzo
UDP 23476=Donald Dick
UDP 25123=MOTD
UDP 26274=Delta Source
UDP 26374=Sub-7 2.1
UDP 26444=Trin00/TFN2K
UDP 26573=Sub-7 2.1
UDP 27184=Alvgus trojan 2000
UDP 27444=Trinoo
UDP 29589=KiLo
UDP 29891=The Unexplained
UDP 30103=NetSphere
UDP 31320=Little Witch
UDP 31335=Trin00 DoS Attack
UDP 31337=Baron Night, BO client, BO2, Bo Facil, BackFire, Back Orifice, DeepBO
UDP 31338=Back Orifice, NetSpy DK, DeepBO
UDP 31339=Little Witch
UDP 31340=Little Witch
UDP 31416=Lithium
UDP 31787=Hack aTack
UDP 31789=Hack aTack
UDP 31790=Hack aTack
UDP 31791=Hack aTack
UDP 33390=未知木馬
UDP 34555=Trinoo
UDP 35555=Trinoo
UDP 43720=KiLo
UDP 44014=Iani
UDP 44767=School Bus
UDP 46666=Taskman
UDP 47262=Delta Source
UDP 47624=Direct Play Server
UDP 47785=KiLo
UDP 49301=OnLine keyLogger
UDP 49683=Fenster
UDP 49698=KiLo
UDP 52901=Omega
UDP 54320=Back Orifice
UDP 54321=Back Orifice 2000
UDP 54341=NetRaider Trojan
UDP 61746=KiLO
UDP 61747=KiLO
UDP 61748=KiLO
UDP 65432=The Traitor
第三篇:配置ftp服務(wù)器
ftp服務(wù)器配置
1、檢查系統(tǒng)中是否已經(jīng)安裝vsftpd服務(wù)(廢話,有沒有自己不知道嗎) [root@localhost ~]# rpm -qa | grep vsftpd // 檢查系統(tǒng)中是否安裝vsftpd
2、自動安裝vsftpd或者手動安裝
[root@localhost ~]# yum -y install vsftpd //安裝vsftp軟件包
[root@serverLI ~]# rpm -ivh /download/vsftpd-2.2.2-11.el6_4.1.i686.rpm //安裝vsftpd軟件包
//rpm -i RPM軟件包
安裝軟件包 //rpm -ivh RPM軟件包 安裝軟件包同時(shí)顯示安裝過程
3、服務(wù)運(yùn)行管理
[root@localhost ~]# service vsftpd status //status查看ftp服務(wù)狀態(tài)、start啟動服務(wù)、stop停止服務(wù)、restart重啟服務(wù)
4、查看vsftpd配置文件
[root@localhost ~]# grep -v "#" /etc/vsftpd/vsftpd.conf //去掉vsftpd.conf中的注釋行
5、配置selinux [root@localhost ~]# getsebool -a | grep ftp //查看selinux中ftp的相關(guān)配置 allow_ftpd_anon_write --> off allow_ftpd_full_acce --> off allow_ftpd_use_cifs --> off allow_ftpd_use_nfs --> off ftp_home_dir --> off ftpd_connect_db --> off ftpd_use_paive_mode --> off httpd_enable_ftp_server --> off tftp_anon_write --> off [root@localhost ~]#
[root@localhost ~]# setsebool ftp_home_dir 1 //設(shè)置ftp_home_dir狀態(tài)為on [root@localhost Desktop]# setsebool -P ftp_home_dir 1 //設(shè)置開機(jī)自動啟動
6、關(guān)閉防火墻、及兩個常見故障
[root@localhost Desktop]# service iptables stop //設(shè)置防火墻關(guān)閉,也可以通過iptables來配置
C:\\\\Windows\\\\System32>ftp 192.168.1.9 ftp> ftp>
//無法訪問ftp,原因?yàn)榉阑饓﹂_啟
500 OOPS: cannot change directory:/home/zhujingzi //如果服務(wù)器上沒有設(shè)置selinux則會提示這個錯誤,設(shè)置selinux,ftp_home_dir=on
---------------------------到此處簡單的ftp算是設(shè)置完成,下面設(shè)置vsftpd下的虛擬用戶
1、配置虛擬用戶名和密碼
[root@localhost vsftpd]# touch ftpuser.txt //在vsftpd目錄下新建一個ftpuser.txt的文件,并不是.txt的文本文檔
[root@localhost vsftpd]# vi ftpuser.txt //編輯ftpuser.txt,奇行為用戶名(虛擬)、偶行為密碼,如: ftptest 123456 book xxzz123
2、生成DB文件并認(rèn)證
[root@localhost Desktop]# yum install db4-utils //安裝db4-utils軟件包,注:db4-utils依賴db4軟件包
#db4-4.7.25-18.el6_4.i686.rpm #db4-utils-4.7.25-18.el6_4.i686.rpm [root@serverLI download]# rpm -ivh db4-4.7.25-18.el6_4.i686.rpm //安裝db4軟件包
[root@localhost ~]# db_load -T -t hash -f /etc/vsftpd/ftpuser.txt /etc/vsftpd/ftpuser.db
//生成DB文件
[root@localhost ~]# file /etc/vsftpd/vsftpd_login.db /etc/vsftpd/vsftpd_login.db: Berkeley DB (Hash, version 9, native byte-order) //生成的DB文件
[root@localhost vsftpd]# ls -l -rw-r--r--.1 root root 12288 Apr 28 10:28 vsftpd_login.db [root@localhost vsftpd]# chmod 600 /etc/vsftpd/vsftpd_login.db //修改該文件的訪問權(quán)限 [root@localhost vsftpd]# ls -l /etc/vsftpd/vsftpd_login.db -rw-------.1 root root 12288 Apr 28 10:28 /etc/vsftpd/vsftpd_login.db
[root@localhost pam.d]# vi vsftpd //添加認(rèn)證文件
auth required /lib/security/pam_userdb.so db=/etc/vsftpd/ftpuser account required /lib/security/pam_userdb.so db=/etc/vsftpd/ftpuser
3、修改vsftpd.conf配置文件 //配置vsftpd.conf文件,如下: anonymous_enable=NO
//設(shè)定不允許匿名訪問 local_enable=YES
//設(shè)定本地用戶可以訪問。注:如使用虛擬宿主用戶,在該項(xiàng)目設(shè)定為NO的情況下所有虛擬用戶將無法訪問
chroot_list_enable=YES //使用戶不能離開主目錄 ascii_upload_enable=YES ascii_download_enable=YES //設(shè)定支持ASCII模式的上傳和下載功能
pam_service_name=vsftpd //PAM認(rèn)證文件名,PAM將根據(jù)/etc/pam.d/vsftpd進(jìn)行認(rèn)證
//并在vsftpd.conf下手工添加如下信息 guest_enable=YES //設(shè)定啟用虛擬用戶功能
guest_username=ftp //指定虛擬用戶的宿主用戶,CentOS中已經(jīng)有內(nèi)置的ftp用戶
user_config_dir=/etc/vsftpd/vuser_conf //設(shè)定虛擬用戶個人vsftp的CentOS FTP服務(wù)文件存放路徑。存放虛擬用戶個性的CentOS FTP服務(wù)文件(配置文件名=虛擬用戶名)
4、設(shè)置ftp訪問目錄權(quán)限、配置虛擬用戶權(quán)限
[root@localhost ~]# chmod 755 /ftp //修改訪問權(quán)限 [root@localhost ~]# chmod 777 /ftp/data //修改訪問權(quán)限
配置虛擬用戶的訪問權(quán)限,編輯文件對應(yīng)的虛擬用戶名,在/etc/vsftpd/vuser_conf下面 local_root=/etc/vsftpd/ftp anon_world_readable_only=NO anon_upload_enable=YES anon_mkdir_write_enable=YES anon_other_write_enable=YES
5、配置selinux、開機(jī)自動啟動vsftpd服務(wù)
[root@localhost ~]# setsebool allow_ftpd_full_acce 1 //設(shè)置allow_ftpd_full_acce狀態(tài)為on [root@localhost Desktop]# setsebool -P allow_ftpd_full_acce 1 //設(shè)置開機(jī)自動啟動
[root@localhost ~]# chkconfig vsftpd on //設(shè)置開機(jī)自動啟動vsftpd服務(wù)
6、防火墻配置
[root@localhost ~]#iptables -A INPUT -p tcp --dport 22 -j ACCEPT
重啟vsfptd服務(wù)生效