Port 1008 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
1008 |
tcp |
trojans |
AutoSpY, li0n
Backdoor.Win32.Autospy.10 / Unauthenticated Remote Command Execution - the malware listens on TCP port 1008. Third party adversaries who can reach an infected host can issue various commands made available by the backdoor. Command "startapp" will run programs, "msgbox" will send a popup box to message the victim. The "hangup victim" cmd will cause infinite notepad.exe processes to open on the affected machine. Other commands avail are "info tick" which returns system information, "kill" [file] etc.
References: [MVID-2024-0671] |
SG
|
1008 |
tcp |
trojan |
AutoSpY, li0n |
Trojans
|
1008 |
tcp,udp |
ufsd |
ufsd |
Nmap
|
1008 |
tcp |
Lion |
[trojan] Lion |
Neophasis
|
1008 |
tcp,udp |
ufsd |
ufsd UFS-aware server |
Neophasis
|
1008 |
udp |
|
Possibly used by Sun Solaris???? |
IANA
|
|
6 records found
|