Port 8076 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
8076 |
tcp |
trojans |
W32.Spybot.PEN [Symantec-2005-051916-0450-99] (2005.05.19) - worm with DDoS and backdoor capabilities. Spreads through network shares and by exploiting multiple vulnerabilities. Can be dropped by W32.Kelvir.CG. Opens a backdoor by connecting to IRC channel on port 8076/tcp. Exploits vulnerabilities on port 445/tcp ([MS04-011]), and 1433/udp ([MS02-061]).
W32.Mytob.HI@mm [Symantec-2005-071123-0807-99] (2005.07.11) - a mass-mailing worm with backdoor capabilities. Connects to an IRC server and listens for remote commands on port 8076/tcp.
AtlasVPN Linux Client 1.0.3 IP Leak Exploit - the AtlasVPN Linux Client consists of two parts. A daemon (atlasvpnd) that manages the connections and a client (atlasvpn) that the user controls to connect, disconnect and list services. The client does not connect via a local socket or any other secure means but instead it opens an API on localhost on port 8076. It does not have ANY authentication. This port can be accessed by ANY program running on the computer, including the browser. A malicious javascript on ANY website can therefore craft a request to that port and disconnect the VPN. If it then runs another request, this leaks the users home IP address to ANY website using the exploit code. |
SG
|
8076-8077 |
tcp,udp |
applications |
IStreamVideo2HP |
Portforward
|
8076 |
tcp |
slnp |
SLNP (Simple Library Network Protocol) by Sisis Informationssysteme GmbH |
Nmap
|
8076 |
tcp |
threat |
W32.Mytob |
Bekkoame
|
8076 |
tcp |
threat |
W32.Spybot |
Bekkoame
|
8075-8076 |
tcp,udp |
|
Unassigned |
IANA
|
|
6 records found
|