您好,欢迎访问三七文档
轻松查看端口信息网络上的电脑进行通信,都是通过电脑开放的端口来完成的。形象的说,电脑上每个开放的端口就像一扇打开的门。因此要想保证电脑的安全,则需要守好这些打开的门。打开“运行”窗口输入“cmd”后回车进入命令提示符窗口,在提示符下首先输入“netstat-an”并回车,其中参数-a的含义表示显示所有连接和侦听端口,-n表示以数字格式显示地址和端口号,命令执行后我们就可以查看详细的端口开放信息了。其中ActiveConnections表示当前本机活动连接,Proto是指连接时使用的协议名称,LocalAddress表示本地计算机的IP和连接时使用的端口号,ForeignAddress表示连接该端口的远程计算机的IP和端口号,根据这些信息我们就可以轻松查看系统开放的端口。仅知道开放的端口还是不够的,我们还需要查看开放该端口对应的程序。例如我们判断某个端口可疑,希望了解使用该端口的程序,那么就可以在命令提示符下输入“netstat-ano”,这样除了上面显示的信息外还可以显示活动端口对应的进程标识符(PID)。记录下该PID,然后再运行tasklist,这样即可显示当前系统运行的应用程序和对应的PID。根据记录下来的PID就可以找出对应运行的程序。如果是来历不明的程序,那么就可以将其终止进程了。其实如果你不习惯在DOS下操作,那么只需要下载一个ActivePorts。程序运行后,可以将所有的活动端口都显示出来,同时还包括端口对应的程序、路径、本地和远端IP地址。如果根据这些信息判断是非法的,那么只需要将其选中后单击主界面下方的“结束进程”即可解决。常用网络端口对应表对于防火墙很多人不知道如何控制哪几个端口,下面是一些常用的,可以参考一下。20ftp-data21ftp22SSH,pcanywhere23telnet25smtp47VPN53DNS67BOOTPS68BOOTPD/DHCP69TFTP80(UDP)139NETBIOS143IMAP144NEWS443SSL445SMB458QUICKTIMETV545QUICKTIME548AFP554RealTimeStreamingProtocol1080SOCKS1227DNS2GO1433MicrosoftSQLServer1434MicrosoftSQLMonitor1494CitrixICAProtocol1521ORACLESQL1604CitrixICA,MSTerminalServer1723PPTPCONTROLPORT1755WINDOWSMEDIA.ASF1758TFTPMULTICAST3306MYSQL3389RDPProtocol(TerminalServer)4000ICQ5010Yahoo!Messenger5190AIM5631PCAnywheredata5632PCAnywhere5800,5801,5900,5901VNC6000XWINDOWS6667IRC7007MSBD,WindowsMediaencoder7070RealServer/QuickTime8383IMAIL26000Quake27001QuakeWorld27010Half-Life27015Half-Life27960QuakeIII计算机本地端口分析基本端口的用途TCP1=TCPPortServiceMultiplexerTCP2=DeathTCP5=RemoteJobEntry,yoyoTCP7=EchoTCP11=SkunTCP12=BomberTCP16=SkunTCP17=SkunTCP18=消息传输协议,skunTCP19=SkunTCP20=FTPData,AmandaTCP21=文件传输,BackConstruction,BladeRunner,DolyTrojan,Fore,FTPtrojan,InvisibleFTP,Larva,WebEx,WinCrashTCP22=远程登录协议TCP23=远程登录(Telnet),TinyTelnetServer(=TTS)TCP25=电子邮件(SMTP),Ajan,Antigen,EmailPasswordSender,Happy99,Kuang2,ProMailtrojan,Shtrilitz,Stealth,Tapiras,Terminator,WinPC,WinSpy,HaebuCocedaTCP27=AssasinTCP28=AmandaTCP29=MSGICPTCP30=Agent40421TCP31=Agent31,HackersParadise,MastersParadise,Agent40421TCP37=Time,ADMwormTCP39=SubSARITCP41=DeepThroat,ForeplayTCP42=HostNameServerTCP43=WHOISTCP44=ArcticTCP48=DRATTCP49=主机登录协议TCP50=DRATTCP51=FuckLamersBackdoorTCP52=MuSka52,SkunTCP53=DNS,Bonk(DOSExploit)TCP54=MuSka52TCP58=DMSetupTCP59=DMSetupTCP66=AL-BarekiTCP69=W32.Evala.Worm,BackGateKit,Nimda,Pasana,Storm,Stormworm,TheefTCP70=Gopher服务,ADMwormTCP79=用户查询(Finger),Firehotcker,ADMwormTCP80=超文本服务器(Http),Executor,RingZeroTCP81=ChuboTCP99=HiddenPortTCP108=SNA网关访问服务器TCP109=Pop2TCP110=电子邮件(Pop3),ProMailTCP113=Kazimas,AutherIdnetTCP115=简单文件传输协议TCP118=SQLServices,Infector1.4.2TCP119=Newsgroup(Nntp),Happy99TCP121=JammerKiller,BojammerkillahTCP129=PasswordGeneratorProtocolTCP123=NetControllerTCP133=Infector1.x//TCP135=NetbiosRemoteprocedurecall//TCP137=Netbiosname(DoSattacks)//TCP138=Netbiosdatagram//TCP139=Netbiossession(DoSattacks)TCP143=IMAPTCP146=FCInfector,InfectorTCP150=NetBIOSSessionServiceTCP156=SQL服务器TCP161=SnmpTCP162=Snmp-TrapTCP170=A-TrojanTCP179=Border网关协议(BGP)TCP190=网关访问控制协议(GACP)TCP194=IrcTCP197=目录定位服务(DLS)TCP256=NirvanaTCP315=TheInvasorTCP389=LightweightDirectoryAccessProtocol(LDAP)TCP396=NovellNetwareoverIPTCP420=BreachTCP421=TCPWrappersTCP443=安全服务TCP444=SimpleNetworkPagingProtocol(SNPP)TCP445=Microsoft-DSTCP456=Hackersparadise,FuseSparkTCP458=苹果公司QuickTimeTCP531=RasminTCP546=DHCPClientTCP547=DHCPServerTCP555=Ini-Killer,PhaseZero,StealthSpyTCP569=MSNTCP605=SecretServiceTCP606=Noknok8TCP661=Noknok8TCP666=AttackFTP,SatanzBackdoor,BackConstruction,DarkConnectionInside1.2TCP667=Noknok7.2TCP668=Noknok6TCP692=GayOLTCP777=AIMSpyTCP808=RemoteControl,WinHoleTCP815=EveryoneDarlingTCP901=Backdoor.DevilTCP911=DarkShadowTCP999=DeepThroatTCP1000=DerSpaeherTCP1001=Silencer,WebEx,DerSpaeherTCP1003=BackDoorTCP1010=DolyTCP1011=DolyTCP1012=DolyTCP1015=DolyTCP1020=VampireTCP1024=NetSpy.698(YAI)已知的一些扩展端口TCP1025=NetSpy.698TCP1033=NetspyTCP1042=BlaTCP1045=RasminTCP1047=GateCrasherTCP1050=MiniCommandTCP1080=WingateTCP1090=Xtreme,VDOLiveTCP1095=RatTCP1097=RatTCP1098=RatTCP1099=RatTCP1111=Backdoor.AIMVisionTCP1170=PsyberStreamServer,StreamingAudiotrojan,VoiceTCP1200=NoBackOTCP1201=NoBackOTCP1207=SoftwarTCP1212=Nirvana,VisulKillerTCP1234=UltorsTCP1243=BackDoor-G,SubSeven,SubSevenApocalypseTCP1245=VooDooDollTCP1269=MavericksMatrixTCP1313=NirvanaTCP1349=BioNetTCP1441=RemoteStormTCP1492=FTP99CMP(BackOriffice.FTP)TCP1509=PsyberStreamingServerTCP1600=Shivka-BurkaTCP1703=Exloiter1.1TCP1807=SpySenderTCP1966=FakeFTP2000TCP1976=CustomportTCP1981=ShockraveTCP1999=BackDoor,TransScoutTCP2000=DerSpaeher,INsaneNetworkTCP2001=TransmissonscoutTCP2002=TransmissonscoutTCP2003=TransmissonscoutTCP2004=TransmissonscoutTCP2005=TTransmissonscoutTCP2023=Ripper,PassRipper,HackCityRipperProTCP2115=BugsTCP2121=NirvanaTCP2140=DeepThroat,TheInvasorTCP2155=NirvanaTCP2208=RuXTCP2255=IllusionMailerTCP2283=HVLRat5TCP2300=PCExplorerTCP2311=Studio54TCP2565=StrikerTCP2583=WinCrashTCP2600=DigitalRootBeerTCP2716=PrayerTrojanTCP2801=PhineasPhuckerTCP2989=RatTCP3024=WinCrashtrojanTCP3128=RingZeroTCP312
本文标题:轻松查看端口信息
链接地址:https://www.777doc.com/doc-4059478 .html