Dec 11, 2003 · Here is a list i made after about a month's research. By using some of the most popular Anti-Virus programes like Norton Antivirus 2003 and a bit 2004. Hope you find it useful. General Ports: Commonly used non-trojaneous common protocol ports: 13 17 19 21 23 25 79 80 103 110 113 135 139 1080; Targeted TCP Port Scan-List (Proxies, SOCKS

Trojan Port List [Archive] - SpeedGuide.net Broadband 25 Ajan, Antigen, Barok, Email Password Sender - EPS, EPS II, Gip, Gris, Happy99, Hpteam mail, Hybris, I love you, Kuang2, Magic Horse, MBT (Mail Bombing Trojan), Moscow Email trojan, Naebi, NewApt worm, ProMail trojan, Shtirlitz, Stealth, Tapiras, Terminator, WinPC, WinSpy List of TCP and UDP port numbers - Wikipedia This is a list of TCP and UDP port numbers used by protocols of the Internet protocol suite for operation of network applications.. The Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) needed only one port for full-duplex, bidirectional traffic. The Stream Control Transmission Protocol (SCTP) and the Datagram Congestion Control Protocol (DCCP) also use port numbers. Trojan Port List - Linux Server Tutorials - Rapid Purple With that in mind – comes this list – listing the majority of the more popular known trojans, and the ports they normally use. Of course several of them could use any port, but I hope this list will maybe give you a clue of what might be going on with your server or network. TCP 1 Breach.2001, SocketsDeTroie.230, SocketsDeTroie.250

Trojan and Open port - Netstat -a Solutions | Experts Exchange

Dec 11, 2003 · Here is a list i made after about a month's research. By using some of the most popular Anti-Virus programes like Norton Antivirus 2003 and a bit 2004. Hope you find it useful. General Ports: Commonly used non-trojaneous common protocol ports: 13 17 19 21 23 25 79 80 103 110 113 135 139 1080; Targeted TCP Port Scan-List (Proxies, SOCKS

Jun 22, 2009

Jun 09, 2016 · SubSeven, Back Orifice, ProRat, Turkojan, and Poison-Ivy are established programs. Others, such as CyberGate, DarkComet, Optix, Shark, and VorteX Rat have a smaller distribution and utilization. This is just a small number of known Remote Access Trojans, and a full list would be quite extensive, and would be continually growing. This is a list of TCP and UDP port numbers used by protocols of the Internet protocol suite for operation of network applications.. The Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) needed only one port for full-duplex, bidirectional traffic. Trojan Ports. This is a list of known common ports that are used by remote access trojans (RATs). Please note that this is not a complete list as new trojans are being released into the wild on an almost daily basis. Unless otherwise noted, all ports are TCP. 1 (UDP) - Sockets des Troie 2 Death 20 Senna Spy FTP server Common ports, such as TCP port 80 (HTTP), may be locked down — but other ports may get overlooked and be vulnerable to hackers. In your security tests, be sure to check these commonly hacked TCP and UDP ports: TCP port 21 — FTP (File Transfer Protocol) TCP port 22 — SSH (Secure Shell) TCP […] advICE:Exploits:Ports a nice hyperlinked port list PestPatrol - About Ports and Trojans - A Port List. Additional Resources. Trojan Horses: Back Orifice & Netbus; Anti-trojan.org; Although not specific to trojan ports, you may find the port search resources from my TCP/IP Ports page to be useful. Trojans in the News and Commonly Probed. As of