Port 20888 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
20888 |
tcp |
malware |
Backdoor.Win32.XRat.d / Unauthenticated Remote Command Execution - XRat malware runs with SYSTEM integrity and listens on TCP port 20888. Third-party attackers who can reach the system can connect, switch to DOS prompt mode and run any OS commands re-compromising the already infected system.
References: [MVID-2021-0242]
Backdoor.Win32.XRat.k / Unauthenticated Remote Command Execution - XRat malware listens on TCP port 20888. Third-party attackers who can reach the system can run commands hijacking the infected host.
References: [MVID-2022-0482] |
SG
|
20000-21000 |
udp |
applications |
Ground Control |
Portforward
|
20000-21000 |
udp |
applications |
Ground Control with Chat Rooms |
Portforward
|
20671-20998 |
tcp,udp |
|
Unassigned |
IANA
|
|
4 records found
|