Virus Alerts

Current Updates

Date: Mon, Oct. 25, 1999.
Subject: virus alert:
Budweiser Frogs

Date: November-10-1999
Subject: virus alert.
Bubbleboy.
Thread worm virus.

Subject: virus alert:
Mellissa virus.
Thread worm virus.


Subject: virus alert:
Netbus
Back orrifice variant

Subject: virus alert.
Masters Paradise
Back orrifice variant

Subject: virus alert:
Girlfriend
Back orrifice variant

Subject: virus alert.
Promise Software.

Subject: virus alert.
Explore.zip virus.

Subject: virus alert:
Chernobyl virus.

Subject: virus alert.
Back Orrifice trojan.


Port Security


Safeguards


Security





Welcome

This Site will attempt to keep up with new inovations and updates of current computer virus information.
There are more than 10,000 new and variations of computer virus written a month.


Please Note:
* Win 95 or Win 98: adding too many ports to scan for your scanner and operating system and machine, may cause certain problems (*about* 20 or 25, depending on your system).
* If running Win NT. (up to 50 ports)


In any event there are too many ports for operating systems, scanners and domestic machines to scan and monitor at the same time or even close.



Port 1 Protocol Trojan Information NN 2.9b-def
0 ICMP Click attack Yes
19 UDP Chargen Yes
21 TCP Detects if someone is trying to FTP to you. No
23 TCP Detects if someone is trying to Telnet to you. No
25 * TCP Several trojans use this port. No
31 * TCP Agent 31, Hacker's Paradise, Master's Paradise No
41 * TCP Deep Throat No
53 TCP DNS Yes
58 * TCP DM Setup No
80 * TCP Executor No
110 * TCP ProMail Trojan No
121 * TCP Jammer Killah No
129 TCP Password Generator Protocol Yes
137 TCP Netbios name (DoS attacks) Yes
138 TCP Netbios datagram (DoS attacks) Yes
139 TCP Netbios session (DoS attacks) Yes
456 * TCP Hacker's Paradise No
555 TCP Stealth Spy, Phaze No
666 TCP Attack FTP No
1001 * TCP Silencer, WebEx No
1011 * TCP Doly Trojan No
1012 * TCP Doly Trojan No
1024 * TCP NetSpy No
1027 TCP ICQ Yes
1029 TCP ICQ Yes
1032 TCP ICQ Yes
1080 TCP Used to detect Wingate sniffers. Yes
1170 * TCP Voice Streaming Audio No
1243 TCP Sub Seven No
1245 * TCP VooDoo Doll No
1492 * TCP FTP99CMP No
1981 TCP Shockrave No
1999 * TCP BackDoor No
2001 * TCP Trojan Cow No
2023 * TCP Ripper No
2115 * TCP Bugs No
2140 * TCP Deep Throat No
2140 UDP Deep Throat No
2565 * TCP Striker No
2583 * TCP WinCrash No
2801 * TCP Phineas Phucker No
2989 UDP Rat No
3024 * TCP WinCrash No
3129 * TCP Master's Paradise No
3150 * TCP Deep Throat No
3150 UDP Deep Throat No
3389 3 * TCP See footnote 3 at the bottom of this table. No
3700 * TCP Portal of Doom No
4092 * TCP WinCrash No
4590 * TCP ICQ Trojan No
5000 2 TCP Detects & blocks Sokets de Trois v1. Yes
5001 TCP Detects & blocks Sokets de Trois v1. Yes
5400 * TCP Blade Runner No
5401 * TCP Blade Runner No
5402 * TCP Blade Runner No
5569 * TCP Robo-Hack No
5742 * TCP WinCrash No
6400 * TCP The Thing No
6670 * TCP Deep Throat No
6711 TCP Sub Seven No
6712 * TCP Sub Seven No
6713 * TCP Sub Seven No
6771 * TCP Deep Throat No
6776 TCP Sub Seven No
6939 * TCP Indoctrination No
6969 TCP Gate Crasher, Priority No
6970 * TCP Gate Crasher No
7000 * TCP Remote Grab No
7300 TCP Net Monitor No
7301 TCP Net Monitor No
7306 * TCP Net Monitor No
7307 * TCP Net Monitor No
7308 * TCP Net Monitor No
7789 * TCP ICKiller No
9872 * TCP Portal of Doom No
9873 * TCP Portal of Doom No
9874 * TCP Portal of Doom No
9875 * TCP Portal of Doom No
9989 * TCP iNi-Killer No
10067 * TCP Portal of Doom No
10067 UDP Portal of Doom No
10167 * TCP Portal of Doom No
10167 UDP Portal of Doom No
10520 * TCP Acid Shivers No
10607 * TCP Coma No
11000 * TCP Senna Spy No
11223 * TCP Progenic Trojan No
12076 TCP GJamer No
12223 * TCP Hack'99, KeyLogger No
12345 TCP Netbus, Ultor's Telnet Trojan No
12346 TCP Netbus No
12456 * TCP NetBus No
13000 * TCP Senna Spy No
16969 * TCP Priority No
20000 TCP Millennium No
20001 TCP Millennium No
20034 * TCP NetBus 2 Pro No
21554 TCP GirlFriend No
22222 * TCP Prosiak No
23456 TCP EvilFTP, UglyFTP No
26274 * TCP Delta Source No
26274 * UDP Delta Source No
29891 * TCP The Unexplained No
30100 TCP NetSphere No
30101 * TCP NetSphere No
30102 TCP NetSphere No
30303 * TCP Sockets de Troie No
31337 UDP Backorifice (BO) No
31337 TCP Netpatch No
31338 * TCP NetSpy DK No
31338 UDP Deep BO No
31339 * TCP NetSpy DK No
31785 TCP Hack'a'Tack No
31789 UDP Hack'a'Tack No
31791 UDP Hack'a'Tack No
33333 * TCP Prosiak No
40421 TCP Master's Paradise - Hacked No
40412 * TCP The Spy No
40422 TCP Master's Paradise - Hacked No
40423 TCP Master's Paradise - Hacked No
40425 TCP Master's Paradise - Hacked No
40426 * TCP Master's Paradise No
47252 * TCP Delta Source No
47262 * UDP Delta Source No
50505 TCP Detects & blocks Sokets de Trois v2. No
50776 * TCP Fore No
53001 * TCP Remote Windows Shutdown No
54320 TCP Back Orifice 2000 No
54320 * UDP Back Orifice No
54321 * TCP School Bus, Back Orifice No
54321 UDP Back Orifice 2000 No
60000 * TCP Deep Throat No
61466 * TCP Telecommando No
65000 TCP Devil No


These are ports from 0 - 65000

Of course, unfortunately, this list does not cover all the porting security problems.

65000 - 655335 is not expanded upon on this list.

Port numbers are divided into 3 ranges or categories:
1) Well Known Ports (assigned), 2) Registered Ports, 3) Dynamic and/or Private Ports.

Well Known Ports are from 0 through 1023.
The assigned ports use a small portion of the possible port numbers. For many years the assigned ports were in the range 0-255. Recently, the range for assigned ports managed by the IANA has been expanded to the range 0-1023.
Registered Ports are from 1024 through 49151
Dynamic and/or Private Ports are those from 49152 through 65535

This list does not address registered ports, dynamic/private ports and capabilities of these services.

This list does not address ports from 65535 - ...

There are other porting security problem possibilities depending on the opponent programmers knowledge, capabilities and techniques utilised and techniques used (by both partys).

1 Win 95, Win 98: adding too many ports to scan may cause certain problems. (slow or no system resources)(20-25 max)

Win NT possibly scans up to 50 ports successfully.

2 Problems connecting to IRC servers, remove port 5000.
3 Win NT is vulnerable to Terminal Server Attack through port 3389 (tcp).

Denial of service attack affects CPU/GDI Resources and eventually and can crash the system network or machine.
Affects Win NT Workstation and Server.
Use post service pack 5 patch to fix it. (MS)


These attempts at security options don't consider higher more advanced technologies or trains of thought than these considered by most Network Administrators, Engineers or Management.

Newer Infra Red (IR) and Radio Frequency (RF) technology possibilities may make the mind boggle for security answers.




For more information or if you have questions about content please e-mail Koalas Internet Security.


 


Virus Alert Reference Index

tucows Icon Shareware AVP
Norton Anti-virus NukeNabber. Security
Safeguards Shareware.com Port Security