speedguide.net  

Port 65000 Details


known port assignments and vulnerabilities
threat/application/port search:
 search
Port(s) Protocol Service Details Source
65000 tcp trojans Trojans that use this port: Devil 13, Sockets des Troie, Stacheldraht (DDoS)
SG
65000 udp trojans Devil trojan horse 1.03

Backdoor.Win32.Whgrx / Remote Host Header Stack Buffer Overflow - the specimen listens on datagram UDP port 65000, by sending a specially crafted HTTP PUT request and specifying a large string of characters for the HOST header we trigger the buffer overflow overwriting stack registers. Upon running the malware it may display a "Cannot load shared library wsocx.dll" message but still runs normally. The exploit payload specifies both 41414141 and 42424242 pattern with 42424242 overwriting SEH and ECX register, the 42424242 pattern was target the HTTP HOST header.
References: [MVID-2021-0030]
SG
65000 tcp trojan Devil, Sockets des Troie, Stacheldraht Trojans
65000 tcp Devil [trojan] Devil SANS
65000 tcp SocketsdesTroie [trojan] Sockets des Troie SANS
65000 tcp Stacheldrahtagent [trojan] Stacheldraht agent - handler SANS
65000 tcp Stacheldraht [trojan] Stacheldraht SANS
13139,27900,65000 udp applications Command and Conquer 3 Tiberian Wars Portforward
65000 tcp threat Roxrat Bekkoame
9 records found
News Glossary of Terms FAQs Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About