Port 2015 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
2015 |
tcp |
malware |
Backdoor.Win32.Guptachar.20 / Insecure Credential Storage - the malware runs a web server on TCP port 2015 (default) and uses BASIC authentication. The credentials "hacker01:imchampgr8" get stored in a .NFO information file named "GPTCR.NFO" under Windows dir base64 encoded and hidden among many junk NULL bytes.
References: [MVID-2022-0631] |
SG
|
2015 |
tcp |
cypress |
cypress |
Nmap
|
2015 |
udp |
raid-cs |
raid-cs |
Nmap
|
|
3 records found
|