Port 65000 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
65000 |
tcp |
trojans |
Trojans that use this port: Devil 13, Sockets des Troie, Stacheldraht (DDoS)
|
SG
|
65000 |
udp |
trojans |
Devil trojan horse 1.03
Backdoor.Win32.Whgrx / Remote Host Header Stack Buffer Overflow - the specimen listens on datagram UDP port 65000, by sending a specially crafted HTTP PUT request and specifying a large string of characters for the HOST header we trigger the buffer overflow overwriting stack registers. Upon running the malware it may display a "Cannot load shared library wsocx.dll" message but still runs normally. The exploit payload specifies both 41414141 and 42424242 pattern with 42424242 overwriting SEH and ECX register, the 42424242 pattern was target the HTTP HOST header.
References: [MVID-2021-0030] |
SG
|
65000 |
tcp |
trojan |
Devil, Sockets des Troie, Stacheldraht |
Trojans
|
65000 |
tcp |
Devil |
[trojan] Devil |
SANS
|
65000 |
tcp |
SocketsdesTroie |
[trojan] Sockets des Troie |
SANS
|
65000 |
tcp |
Stacheldrahtagent |
[trojan] Stacheldraht agent - handler |
SANS
|
65000 |
tcp |
Stacheldraht |
[trojan] Stacheldraht |
SANS
|
13139,27900,65000 |
udp |
applications |
Command and Conquer 3 Tiberian Wars |
Portforward
|
65000 |
tcp |
threat |
Roxrat |
Bekkoame
|
|
9 records found
|