


Summary of 40 commonly used intrusion ports for hackers worth collecting
Nov 23, 2019 pm 05:17 PMCommonly used ports:
# #21 Port Penetration Analysis
(1)基礎爆破:ftp爆破工具很多,這里我推owasp的Bruter,hydra以及msf中的ftp爆破模塊。 (2) ftp匿名訪問:用戶名:anonymous 密碼:為空或者任意郵箱 (3)后門vsftpd :version 2到2.3.4存在后門漏洞,攻擊者可以通過該漏洞獲取root權限。 (https://www.freebuf.com/column/143480.html) (4)嗅探:ftp使用明文傳輸技術(但是嗅探給予局域網(wǎng)并需要欺騙或監(jiān)聽網(wǎng)關),使用Cain進行滲透。 (5)ftp遠程代碼溢出。(https://blog.csdn.net/weixin_42214273/article/details/82892282) (6)ftp跳轉攻擊。(https://blog.csdn.net/mgxcool/article/details/48249473)
22 Port Penetration Analysis
(1)弱口令,可使用工具hydra,msf中的ssh爆破模塊。 (2)防火墻SSH后門。(https://www.secpulse.com/archives/69093.html) (3)28退格 OpenSSL (4)openssh 用戶枚舉 CVE-2018-15473。(https://www.anquanke.com/post/id/157607)
23 Port Penetration Analysis
(1)暴力破解技術是常用的技術,使用hydra,或者msf中telnet模塊對其進行破解。 (2)在linux系統(tǒng)中一般采用SSH進行遠程訪問,傳輸?shù)拿舾袛?shù)據(jù)都是經(jīng)過加密的。而對于windows下的telnet來說是脆弱的, 因為默認沒有經(jīng)過任何加密就在網(wǎng)絡中進行傳輸。使用cain等嗅探工具可輕松截獲遠程登錄密碼。
25/465 port penetration analysis
默認端口:25(smtp)、465(smtps) (1)爆破:弱口令 (2)未授權訪問
53 Port Penetration Analysis
(1)使用DNS遠程溢出漏洞直接對其主機進行溢出攻擊,成功后可直接獲得系統(tǒng) 權限。(https://www.seebug.org/vuldb/ssvid-96718) (2)使用DNS欺騙攻擊,可對DNS域名服務器進行欺騙,如果黑客再配合網(wǎng)頁木馬進行掛馬攻擊,無疑是一種殺傷力很強的攻 擊,黑客可不費吹灰之力就控制內(nèi)網(wǎng)的大部分主機。 這也是內(nèi)網(wǎng)滲透慣用的技法之一。(https://baijiahao.baidu.com/s?id=1577362432987749706&wfr=spider&for=pc) (3)拒絕服務攻擊,利用拒絕服務攻擊可快速的導致目標服務器運行緩慢,甚至網(wǎng)絡癱瘓。如果使用拒絕服務攻擊其DNS服務器。 將導致用該服務器進行域名解析的用戶無法正常上網(wǎng)。(http://www.edu.cn/xxh/fei/zxz/201503/t20150305_1235269.shtml) (4)DNS劫持。(https://blog.csdn.net/qq_32447301/article/details/77542474)
135 port penetration analysis
135 port is mainly used to use the RPC protocol and provide DCOM services. RPC can ensure that programs running on a computer can run smoothly Execute code on the remote computer directly; use DCOM to communicate directly through the network, and can be transmitted across a variety of networks including the HTTP protocol. At the same time, this port has also exposed many vulnerabilities, the most serious of which is the buffer overflow vulnerability. The once crazy 'Shock Wave' virus used this vulnerability to spread. For the penetration of port 135, the hacker's penetration method is:(1)查找存在RPC溢出的主機,進行遠程溢出攻擊,直接獲得系統(tǒng)權限。如用‘DSScan’掃描存在此漏洞的主機。 對存在漏洞的主機可使用‘ms05011.exe’進行溢出, 溢出成功后獲得系統(tǒng)權限。(https://wenku.baidu.com/view/68b3340c79563c1ec5da710a.html) (2)掃描存在弱口令的135主機,利用RPC遠程過程調(diào)用開啟telnet服務并登錄telnet執(zhí)行系統(tǒng)命令。 系統(tǒng)弱口令的掃描一般使用hydra。 對于telnet服務的開啟可使用工具kali鏈接。(https://wenku.baidu.com/view/c8b96ae2700abb68a982fbdf.html)
139/445 port penetration analysis
The 139 port is for 'NetBIOS SessionService 'Provided, mainly used to provide Windows file and printer sharing and Samba services in UNIX. Port 445 is also used to provide Windows file and printer sharing, and is widely used in intranet environments. These two ports are also key targets of attacks, and many serious vulnerabilities have appeared on port 139/445. The following is an analysis of the basic ideas for penetrating such ports.(1)對于開放139/445端口的主機,一般嘗試利用溢出漏洞對遠程主機進行溢出攻擊,成功后直接獲得系統(tǒng)權限。 利用msf的ms-017永恒之藍。(https://blog.csdn.net/qq_41880069/article/details/82908131) (2)對于攻擊只開放445端口的主機,黑客一般使用工具‘MS06040’或‘MS08067’.可使用專用的445端口掃描器進行掃描。 NS08067溢出工具對windows2003系統(tǒng)的溢出十分有效, 工具基本使用參數(shù)在cmd下會有提示。(https://blog.csdn.net/god_7z1/article/details/6773652) (3)對于開放139/445端口的主機,黑客一般使用IPC$進行滲透。在沒有使用特點的賬戶和密碼進行空連接時,權限是最小的。 獲得系統(tǒng)特定賬戶和密碼成為提升權限的關鍵了,比如獲得administrator賬戶的口令。(https://blog.warhut.cn/dmbj/145.html) (4)對于開放139/445端口的主機,可利用共享獲取敏感信息,這也是內(nèi)網(wǎng)滲透中收集信息的基本途徑。
1433 Port Penetration Analysis
1433 is the default port of SQL Server. The SQL Server service uses two ports: tcp-1433 and UDP-1434. Among them, 1433 is used for For SQL Server to provide external services, 1434 is used to return to the requester which TCP/IP ports are used by SQL Server. Port 1433 is usually attacked by hackers, and there are endless ways to attack. The most serious one is the remote overflow vulnerability. For example, due to the rise of SQL injection attacks, various databases are always facing security threats. Using SQL injection technology to penetrate databases is currently a popular attack method, and this type of technology belongs to script penetration technology.(1)對于開放1433端口的SQL Server2000的數(shù)據(jù)庫服務器,黑客嘗試使用遠程溢出漏洞對主機進行溢出測試, 成功后直接獲得系統(tǒng)權限。(https://blog.csdn.net/gxj022/article/details/4593015) (2)暴力破解技術是一項經(jīng)典的技術。一般破解的對象都是SA用戶。 通過字典破解的方式很快破解出SA的密碼。(https://blog.csdn.net/kali_linux/article/details/50499576) (3)嗅探技術同樣能嗅探到SQL Server的登錄密碼。 (4)由于腳本程序編寫的不嚴密,例如,程序員對參數(shù)過濾不嚴等,這都會造成嚴重的注射漏洞。 通過SQL注射可間接性的對數(shù)據(jù)庫服務器進行滲透,通過調(diào)用一些存儲過程執(zhí)行系統(tǒng)命令??梢允褂肧QL綜合利用工具完成。
1521 Port Penetration Analysis
1521 is the default listening port of the large database Oracle. It is estimated that novices are still unfamiliar with this port. Usually everyone is more exposed to it. There are three databases: Access, MSSQL and MYSQL. Generally, only large sites will deploy this relatively expensive database system. For penetrating this relatively complex database system, the hacker's idea is as follows:(1)Oracle擁有非常多的默認用戶名和密碼,為了獲得數(shù)據(jù)庫系統(tǒng)的訪問權限, 破解數(shù)據(jù)庫系統(tǒng)用戶以及密碼是黑客必須攻破的一道安全防線。 (2)SQL注射同樣對Oracle十分有效,通過注射可獲得數(shù)據(jù)庫的敏感信息,包括管理員密碼等。 (3)在注入點直接創(chuàng)建java,執(zhí)行系統(tǒng)命令。(4)https://www.leiphone.com/news/201711/JjzXFp46zEPMvJod.html
2049 port penetration analysis
NFS (Network File System) is the network file system. One of the file systems supported by FreeBSD, which allows resources to be shared between computers on the network through the TCP/IP network. In NFS applications, local NFS client applications can transparently read and write files located on the remote NFS server, just like accessing local files. Nowadays, NFS has the function to prevent export folders from being exploited, but if the NFS service in the legacy system is not properly configured, it may still be exploited by malicious attackers.3306 port penetration analysis
3306是MYSQL數(shù)據(jù)庫默認的監(jiān)聽端口,通常部署在中型web系統(tǒng)中。在國內(nèi)LAMP的配置是非常流行的,對于php+mysql構架的攻擊也是屬于比較熱門的話題。mysql數(shù)據(jù)庫允許用戶使用自定義函數(shù)功能,這使得黑客可編寫惡意的自定義函數(shù)對服務器進行滲透,最后取得服務器最高權限。
對于3306端口的滲透,黑客的方法如下:
(1)由于管理者安全意識淡薄,通常管理密碼設置過于簡單,甚至為空口令。使用破解軟件很容易破解此類密碼, 利用破解的密碼登錄遠程mysql數(shù)據(jù)庫,上傳構造的惡意UDF自定義函數(shù)代碼進行注冊,通過調(diào)用注冊的惡意函數(shù)執(zhí)行系統(tǒng)命令。 或者向web目錄導出惡意的腳本程序,以控制整個web系統(tǒng)。 (2)功能強大的‘cain’同樣支持對3306端口的嗅探,同時嗅探也是滲透思路的一種。 (3)SQL注入同樣對mysql數(shù)據(jù)庫威脅巨大,不僅可以獲取數(shù)據(jù)庫的敏感信息,還可使用load_file()函數(shù)讀取系統(tǒng)的敏感配置文件 或者從web數(shù)據(jù)庫鏈接文件中獲得root口令等,導出惡意代碼到指定路徑等。
3389端口滲透剖析
3389是windows遠程桌面服務默認監(jiān)聽的端口,管理員通過遠程桌面對服務器進行維護,這給管理工作帶來的極大的方便。通常此端口也是黑客們較為感興趣的端口之一,利用它可對遠程服務器進行控制,而且不需要另外安裝額外的軟件,實現(xiàn)方法比較簡單。當然這也是系統(tǒng)合法的服務,通常是不會被殺毒軟件所查殺的。
使用‘輸入法漏洞’進行滲透。
(1)對于windows2000的舊系統(tǒng)版本,使用‘輸入法漏洞’進行滲透。 (2)cain是一款超級的滲透工具,同樣支持對3389端口的嗅探。 (3)Shift粘滯鍵后門:5次shift后門 (4)社會工程學通常是最可怕的攻擊技術,如果管理者的一切習慣和規(guī)律被黑客摸透的話, 那么他管理的網(wǎng)絡系統(tǒng)會因為他的弱點被滲透。 (5)爆破3389端口。這里還是推薦使用hydra爆破工具。 (6)ms12_020死亡藍屏攻擊。(https://www.cnblogs.com/R-Hacker/p/9178066.html) (7)https://www.cnblogs.com/backlion/p/9429738.html
4899端口滲透剖析
4899端口是remoteadministrator遠程控制軟件默認監(jiān)聽的端口,也就是平時常說的radmini影子。radmini目前支持TCP/IP協(xié)議,應用十分廣泛,在很多服務器上都會看到該款軟件的影子。對于此軟件的滲透,思路如下:
(1)radmini同樣存在不少弱口令的主機,通過專用掃描器可探測到此類存在漏洞的主機。 (2)radmini遠控的連接密碼和端口都是寫入到注冊表系統(tǒng)中的, 通過使用webshell注冊表讀取功能可讀取radmini在注冊表的各項鍵值內(nèi)容,從而破解加密的密碼散列。
5432端口滲透剖析
PostgreSQL是一種特性非常齊全的自由軟件的對象–關系型數(shù)據(jù)庫管理系統(tǒng),可以說是目前世界上最先進,功能最強大的自由數(shù)據(jù)庫管理系統(tǒng)。包括kali系統(tǒng)中msf也使用這個數(shù)據(jù)庫;淺談postgresql數(shù)據(jù)庫攻擊技術 大部分關于它的攻擊依舊是sql注入,所以注入才是數(shù)據(jù)庫不變的話題。
(1)爆破:弱口令:postgres postgres (2)緩沖區(qū)溢出:CVE-2014-2669。(http://drops.xmd5.com/static/drops/tips-6449.html) (3)遠程代碼執(zhí)行:CVE-2018-1058。(https://www.secpulse.com/archives/69153.html)
5631端口滲透剖析
5631端口是著名遠程控制軟件pcanywhere的默認監(jiān)聽端口,同時也是世界領先的遠程控制軟件。利用此軟件,用戶可以有效管理計算機并快速解決技術支持問題。由于軟件的設計缺陷,使得黑客可隨意下載保存連接密碼的*.cif文件,通過專用破解軟件進行破解。
這些操作都必須在擁有一定權限下才可完成,至少通過腳本滲透獲得一個webshell。通常這些操作在黑客界被稱為pcanywhere提權技術。
PcAnyWhere提權。(https://blog.csdn.net/Fly_hps/article/details/80377199)
5900端口滲透剖析
5900端口是優(yōu)秀遠程控制軟件VNC的默認監(jiān)聽端口,此軟件由著名的AT&T的歐洲研究實驗室開發(fā)的。VNC是在基于unix和linux操作系統(tǒng)的免費的開放源碼軟件,遠程控制能力強大,高效實用,其性能可以和windows和MAC中的任何一款控制軟件媲美。
對于該端口的滲透,思路如下:
(1)VNC軟件存在密碼驗證繞過漏洞,此高危漏洞可以使得惡意攻擊者不需要密碼就可以登錄到一個遠程系統(tǒng)。 (2)cain同樣支持對VNC的嗅探,同時支持端口修改。 (3)VNC的配置信息同樣被寫入注冊表系統(tǒng)中,其中包括連接的密碼和端口。利用webshell的注冊表讀取功能進行讀取加密算法, 然后破解。 (4)VNC拒絕服務攻擊(CVE-2015-5239)。 (http://blogs.#/post/vnc%E6%8B%92%E7%BB%9D%E6%9C%8D%E5%8A%A1%E6%BC%8F%E6%B4%9Ecve-2015- 5239%E5%88%86%E6%9E%90.html) (5)VNC權限提升(CVE-2013-6886)。
6379端口滲透剖析
Redis是一個開源的使用c語言寫的,支持網(wǎng)絡、可基于內(nèi)存亦可持久化的日志型、key-value數(shù)據(jù)庫。關于這個數(shù)據(jù)庫這兩年還是很火的,暴露出來的問題也很多。特別是前段時間暴露的未授權訪問。
(1)爆破:弱口令 (2)未授權訪問+配合ssh key提權。(http://www.alloyteam.com/2017/07/12910/)
7001/7002端口滲透剖析
7001/7002通常是weblogic中間件端口
(1)弱口令、爆破,弱密碼一般為weblogic/Oracle@123 or weblogic (2)管理后臺部署 war 后門 (3)SSRF (4)反序列化漏洞 (5)weblogic_uachttps://github.com/vulhub/vulhub/tree/master/weblogic/ssrfhttps://bbs.pediy.com/thread-224954. htmhttps://fuping.site/2017/06/05/Weblogic-Vulnerability-Verification/https:// blog.gdssecurity.com/labs/2015/3/30/weblogic-ssrf-and-xss-cve-2014-4241-cve-2014-4210-cve-2014-4.html
8080端口滲透剖析
8080端口通常是apache_Tomcat服務器默認監(jiān)聽端口,apache是世界使用排名第一的web服務器。國內(nèi)很多大型系統(tǒng)都是使用apache服務器,對于這種大型服務器的滲透,主要有以下方法:
(1)Tomcat遠程代碼執(zhí)行漏洞(https://www.freebuf.com/column/159200.html) (2)Tomcat任意文件上傳。(http://liehu.tass.com.cn/archives/836) (3)Tomcat遠程代碼執(zhí)行&信息泄露。(https://paper.seebug.org/399/) (4)Jboss遠程代碼執(zhí)行。(http://mobile.www.cnblogs.com/Safe3/archive/2010/01/08/1642371.html) (5)Jboss反序列化漏洞。(https://www.zybuluo.com/websec007/note/838374) (6)Jboss漏洞利用。(https://blog.csdn.net/u011215939/article/details/79141624)
27017端口滲透剖析
MongoDB,NoSQL數(shù)據(jù)庫;攻擊方法與其他數(shù)據(jù)庫類似
(1)爆破:弱口令 (2)未授權訪問;(http://www.cnblogs.com/LittleHann/p/6252421.html)(3)http://www.tiejiang.org/19157.htm
The above is the detailed content of Summary of 40 commonly used intrusion ports for hackers worth collecting. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)
![Soundbar detected as monitor screen on Windows PC [Fix]](https://img.php.cn/upload/article/000/465/014/170835733166289.jpg?x-oss-process=image/resize,m_fill,h_207,w_330)
On Windows PCs, some users have discovered that the Soundbar is recognized as a monitor when connected to the HDMI port. This may cause some confusion, but the solution is not the only one. How to Connect a Soundbar to a PC via HDMI Most soundbars use HDMI, optical, or 3.5mm audio connections. If your soundbar only supports HDMI connections, it must be connected to an HDMI port labeled HDMIARC. Many TVs or monitors are usually equipped with multiple HDMI ports, one of which should support the ARC protocol that complies with the HDMI standard. In other words, HDMI is an interface used to transmit audio and video. If the device does not have an HDMI port, consider using a monitor.

com1 and com2 are serial communication ports, referred to as serial ports; a motherboard generally has two COM serial interfaces, which are usually used to connect mice, which are communication devices. The serial interface refers to the sequential transmission of data bit by bit, which is characterized by communication The circuit is simple, and only a pair of transmission lines can achieve two-way communication.

How to check whether the remote server port is open in Linux: 1. Use the "nmap ip -p port" command to check whether the port is open. The specific command is such as "nmap 172.17.193.18 -p 5902"; 2. Use the "nc -v ip port" command Check whether the port is open. The specific command is "nc -v 172.17.193.18 5902".

How to close port 445 in Win11? Port No. 445 is a TCP port, a shared folder and printer port, which provides file or printer sharing services within the LAN. Recently, some Win11 users want to close port 445, so how should they do it? Many friends don’t know how to operate in detail. The editor below has compiled the detailed operations for closing port 445 in Win11. If you are interested, follow the editor to read below! Detailed operation of closing port 445 in Win11 1. First, press the Win+S key combination, or click the search icon on the bottom taskbar, open the Windows search window, enter Windows Firewall at the top, and then click the best option given by the system.

If you encounter an AHCI port 0 device error every time you start your computer, you need to follow the methods provided in this article to solve the problem. What is AHCI port 0 device error? AHCI device errors are reported by the BIOS. SMART has indicated that the hard drive on port 0 is faulty and may not be accessible. The hard drive may have problems at any time. If it is a desktop computer, it is recommended to try changing the hard drive connection port. If the problem persists, it may be a problem with the hard drive itself. You can run a disk check tool, disable the failed hard drive and check the ports to resolve this issue. Fixing AHCI Port 0 Device Errors on Windows Computers Typically, AHCI Port0 device errors do not originate from operating system issues, but rather from the hard drive failing on port 0.

LSOF (ListOpenFiles) is a command line tool mainly used to monitor system resources similar to Linux/Unix operating systems. Through the LSOF command, users can get detailed information about the active files in the system and the processes that are accessing these files. LSOF can help users identify the processes currently occupying file resources, thereby better managing system resources and troubleshooting possible problems. LSOF is powerful and flexible, and can help system administrators quickly locate file-related problems, such as file leaks, unclosed file descriptors, etc. Via LSOF Command The LSOF command line tool allows system administrators and developers to: Determine which processes are currently using a specific file or port, in the event of a port conflict

What is the cause of iOS17 charging problem? There are several possible reasons why your iPhone may not be charging after updating to iOS17. One possibility is that there is a bug in the software update. Apple is usually quick to fix bugs in iOS updates, so if you're having charging issues it's worth checking to see if a new update is available. Another possibility is that there is a problem with the charging cable or adapter. If you're using a third-party charging cable or adapter, make sure it's certified by Apple. How to Fix iPhone Not Charging Issue Here are some tips on how to fix iPhone not charging issue after iOS17 update: Restart your Apple phone This usually resolves minor issues that may be the root cause of iOS17 charging issue

This website reported on February 12 that the Canadian government plans to ban the sale of hacking tool FlipperZero and similar devices because they are labeled as tools that thieves can use to steal cars. FlipperZero is a portable programmable test tool that helps test and debug various hardware and digital devices through multiple protocols, including RFID, radio, NFC, infrared and Bluetooth, and has won the favor of many geeks and hackers. Since the release of the product, users have demonstrated FlipperZero's capabilities on social media, including using replay attacks to unlock cars, open garage doors, activate doorbells and clone various digital keys. ▲FlipperZero copies the McLaren keychain and unlocks the car Canadian Industry Minister Fran?o
