peki stealth veya closed çıkmasaydı herhangi bir port ta sorun olsaydı bu sorunlar nasıl giderilirdi ?
Güvenliğinizi Test Edin
- 1
- 2
tümü stealth aslında hiç koruma yok sayılır windows güvenlik duvarı + nod32 başka yok
Windows'da hepsi normal. Ancak Linux'ta ne yaptımsa portların dışardan kontrol edilmesine bile izin vermedi. Ubuntu linux kırılamayan tek işletim sistemi ünvanını boş yere almamış demekki...
Yalnızca komut satırından yönetici izni ile kontrol edilebiliyor...
[alıntı=""] Program Port Status Explanation
FTP 21
File Transfer Protocol (FTP) allows users to transfer files to other computers over the Internet. A poorly configured FTP server allows hackers to copy your files, install trojan applications on your computer or obtain unauthorized remote command prompt access to your computer.
SSH 22
Secure Shell (SSH) uses encryption to secure information sent over a network. While it typically improves security there are numerous problems with older versions of SSH which may allow brute force attacks.
Telnet 23
Telnet allows a remote user to access your computer and perform commands. It is suspectible to brute force attacks and clear text password sniffing. A computer is misconfigured if this port is open. Use SSH instead.
SMTP 25
SMTP is used to send email. There are numerous vulnerabilities with SMTP such as unauthorized hard disk file access, username verification or SPAM email redirection.
DNS 53
Domain Name Services are used to tell other computers what your IP address is. There are several exploits associated with this service.
Finger 79
Finger provides information such as usernames and usage information. Turn this service off or block this port to stop others from gaining valuable system information.
HTTP 80
World Wide Web services allow you to publish web pages to the Internet. There are hundreds of severe security vulnerabilities associated with this service. Keep your WWW server software updated.
POP3 110
Post Office Protocol(POP) software downloads email. Hackers may use weaknesses in POP to intercept your email, create fictitious mail accounts or gain remote access to your computer.
NetBIOS 139
NetBIOS is used by Microsoft Windows and some UNIX/Linux programs to share files. If your hard disk is shared improperly (write access to everyone without authentication) you may be giving the world access to your hard disk. (Trojan files can be copied to your computer.) Make sure this port is closed and your hard drive shares are configured properly.
SNMP 161
Simple Network Management Protocol (SNMP) port may allow a hacker to obtain information about your computer. There are also security vulnerabilities associated with this port. You should turn off this service if you don't need it.
SSL 443
HTTP servers use Secure Sockets Layer (SSL) to encrypt data from web browsers. There are hundreds of severe security vulnerabilities associated with this service. Keep your WWW server software updated.
MS DS 445
Microsoft Directory Services is used by Microsoft Networks for security authentication. Typically this port should not be exposed to the Internet.
Socks Proxy 1080
An unsecured SOCKS Proxy may disqualify you from IRC server access. Make sure this port is closed.
KaZaA 1214
KaZaA is a popular peer-to-peer file-sharing program with many known vulnerabilities and at least one known worm (Benjamin) targeting it.
UPnP 5000
Universal Plug and Play allows your computer to automatically integrate with other network devices. There are known security vulnerabilities associated with this service.
HTTP Proxy 8080
HTTP Proxy provides a way for a hacker to pretend to be your computer. Others who may have been hacked may see your computer address and want you to justify why you hacked them.
Program Port Status Trojans Common to Port
Trojan 6776
2000 Cracks, BackDoor-G, SubSeven, VP Killer
Trojan 7000
Exploit Translation Server, Kazimas, Remote Grab, SubSeven, SubSeven 2.1 Gold
Trojan 12345
Ashley, Cron/Crontab, Fat Bitch trojan, GabanBus, icmp_client.c, icmp_pipe.c, Mypic, NetBus, NetBus Toy, NetBus worm, Pie Bill Gates, Whack Job, X-bill
Trojan 20034
NetBus 2.0 Pro, NetBus 2.0 Pro Hidden, NetRex, Whack Job
Trojan 27374
Bad Blood, Ramen, Seeker, SubSeven, SubSeven 2.1 Gold, Subseven 2.1.4 DefCon 8, SubSeven Muie, Ttfloader
Trojan 31337
Back Fire, Back Orifice 1.20 patches, Back Orifice (Lm), Back Orifice Russian, Baron Night, Beeone, BO client, BO Facil, BO spy, BO2, Cron/Crontab, Freak88, Freak2k, icmp_pipe.c,
firewall kullanmıyorum hepsi stealth çıktı ne iş
- 1
- 2