Port 6974 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
6974 |
tcp |
malware |
Backdoor.Win32.Danton.43 / Weak Hardcoded Credentials RCE - The malware listens on TCP port 6974 and stores several pairs of weak hardcoded credentials in plaintext within the executable. First username / password combination is stored as TDanton, TDanton by removing the "T" we get valid creds of Danton, Danton to logon. Other credential pairs are Danton2 Danton2, Danton3 Danton, Danton4 Danton. They can be found by running strings util against the malware executable. Attackers may then upload executables using ftp PASV, STOR commands, this can result in remote code execution.
References: [MVID-2021-0211] |
SG
|
6970-6999 |
tcp,udp |
|
BitTorrent part of full range of ports used most often (unofficial) |
Wikipedia
|
6970-7000 |
udp |
applications |
QuickTime 4 server |
Portforward
|
6970-7170 |
udp |
applications |
RealAudio |
Portforward
|
6971-6996 |
tcp,udp |
|
Unassigned |
IANA
|
|
5 records found
|