Port 1337 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
1337 |
tcp |
trojan |
Razer Chroma SDK Server
Shadyshell
WireGuard VPN
WASTE Encrypted File Sharing Program also uses this port.
neo4j-shell
Strapi
Sails.js
1337 means "elite" in hacker/cracker spelling (1=L, 3=E, 7=T, "LEET"="ELITE"). Because of the reference, it may be used by some backdoors.
VX Search is vulnerable to a buffer overflow, caused by improper bounds checking by 'Proxy Host Name' field. By generating a bind shell on port 1337, a local attacker could overflow a buffer and execute arbitrary code on the system.
References: [XFDB-135140]
Enigma NMS 65.0.0 - Cross-Site Request Forgery
References: [EDB-47363]
Backdoor.Win32.Small.n / Unauthenticated Remote Command Execution (SYSTEM) - the backdoor malware listens on TCP Port 1337, upon successful connection we get handed a remote shell from the infected host with SYSTEM integrity.
References: [MVID-2021-0167]
Backdoor.Win32.WinShell.a / Unauthenticated Remote Command Execution - WinShell listens on TCP port 1337, third-party attackers who can reach the system can execute OS commands further compromising the already infected system.
References: [MVID-2021-0233]
menandmice DNS (IANA official) |
SG
|
1337 |
tcp |
|
PowerFolder P2P Encrypted File Synchronization Program (unofficial) |
Wikipedia
|
1337 |
tcp |
|
WASTE Encrypted File Sharing Program (unofficial) |
Wikipedia
|
1337 |
tcp |
Shadyshell |
[trojan] Shadyshell |
SANS
|
1337 |
tcp |
waste |
Nullsoft WASTE encrypted P2P app |
Nmap
|
1337 |
tcp,udp |
threat |
OptixPro |
Bekkoame
|
1337 |
tcp,udp |
menandmice-dns |
menandmice DNS |
IANA
|
|
7 records found
Related ports: 31337
|