|
Port 4244 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
4244 |
tcp,udp |
vrml-multi-use |
Viber uses the following ports: 80, 443, 4244, 5242, 5243, 7985 TCP/UDP
WhatsApp uses these ports:
80, 443, 4244, 5222, 5223, 5228, 5242 TCP
50318, 59234 TCP/UDP
3478, 45395 UDP
QLIK Sense (cloud analytics platform) runs HTTPS service on port 4244
Viber through 11.7.0.5 allows a remote attacker who can capture a victim's internet traffic to steal their Viber account, because not all Viber protocol traffic is encrypted. TCP data packet 9 on port 4244 from the victim's device contains cleartext information such as the device model and OS version, IMSI, and 16 bytes of udid in a binary format, which is located at approximately offset 0x40 of this packet. Then, the attacker installs Viber on his device, initiates the registration process for any phone number, but doesn't enter a pin from SMS. Instead, he closes Viber. Next, the attacker rewrites his udid with the victim's udid, modifying the viber_udid file, which is located in the Viber preferences folder. (The udid is stored in a hexadecimal format.) Finally, the attacker starts Viber again and enters the pin from SMS.
References: [CVE-2019-18800]
IANA registered for: VRML Multi User Systems |
SG
|
4244 |
vrml |
vrml-multi-use |
Multi User Systems |
Neophasis
|
4242-4299 |
tcp,udp |
vrml-multi-use |
Multi User Systems |
SANS
|
4200-4299 |
tcp,udp |
vrml-multi-use |
VRML Multi User Systems |
IANA
|
|
4 records found
Related ports: 3478 5242 5243 7985
|