Current location - Quotes Website - Collection of slogans - Services corresponding to ports
Services corresponding to ports
135:DCE endpoint resolution

Port 135

Port description c-serv ms RPC endpoint mapper Microsoft runs DCE on this port.

RPC endpoint mapper serves its DCOM. This is similar to the function of UNIX11port.

Can be very similar. Services that use DCOM and/or RPC utilize the endpoint mapper on the machine.

Record their location. When remote customers connect to the machine, they will query the endpoint.

The mapper found the location of the service. Similarly, hackers scan this port of the machine to find out the answer.

For example: Is ExchangeServer running on this computer? What version is it?

Shutdown method: Open your system with 16 editing software (recommended UltraEdit).

Rpcss.dll file under winnt\system32 or x:\windows\system32.

Find 3 1 00 33 00 35

Replace with 30 00 30 00 30

Replace 3 100330035 with 300030030, which means that the port 135 will be added.

Change to 000. So far, the task of modification has been completed, and the following is a problem of saving.

Because the file is running, it cannot be overwritten in the Windows environment. If you are

FAT32 file system, and then directly boot to DOS environment and overwrite the modified file.

Original document.

If it is in NTFS format, it will be more troublesome. Enter safe mode. Then start the Pulis column.

Quit the process, and then use the pskill program (under the hacker website) to kill svchost.exe.

Program. Then go to copy there.

Overwrite and restart, using netstat -an command, you can see that under Windows 2000.

There is no port 135. XP system also has 135 of TCP, but it is not in UDP.

Port 135.

445:

Port description: Port 445 is generally a port for information circulation data, and hackers will generally use this port for you.

The computer is still controlled by Trojan Horse, and the version after windows2000 will automatically open this.

Port. General epidemic viruses, such as shock waves, shock waves and disaster flights, all come out from this port.

The computer is attacking!

Closing method: You can block port 445 by modifying the registry.

Add a key value

Configuration unit: HKEY _ Local _ Machine

Key: System \ Control Set \ Service \ Network \ Parameter

Name: SMBDeviceEnabled

Type: REG_DWORD

Value: 0

Restart the machine after modification.

1025:

Ports assigned by NetSpy.698 applications

45: Message processing module

See/u/1221519137 for details.