Port 135
Port description c-serv ms RPC endpoint mapper Microsoft runs DCE on this port.
RPC endpoint mapper serves its DCOM. This is similar to the function of UNIX11port.
Can be very similar. Services that use DCOM and/or RPC utilize the endpoint mapper on the machine.
Record their location. When remote customers connect to the machine, they will query the endpoint.
The mapper found the location of the service. Similarly, hackers scan this port of the machine to find out the answer.
For example: Is ExchangeServer running on this computer? What version is it?
Shutdown method: Open your system with 16 editing software (recommended UltraEdit).
Rpcss.dll file under winnt\system32 or x:\windows\system32.
Find 3 1 00 33 00 35
Replace with 30 00 30 00 30
Replace 3 100330035 with 300030030, which means that the port 135 will be added.
Change to 000. So far, the task of modification has been completed, and the following is a problem of saving.
Because the file is running, it cannot be overwritten in the Windows environment. If you are
FAT32 file system, and then directly boot to DOS environment and overwrite the modified file.
Original document.
If it is in NTFS format, it will be more troublesome. Enter safe mode. Then start the Pulis column.
Quit the process, and then use the pskill program (under the hacker website) to kill svchost.exe.
Program. Then go to copy there.
Overwrite and restart, using netstat -an command, you can see that under Windows 2000.
There is no port 135. XP system also has 135 of TCP, but it is not in UDP.
Port 135.
445:
Port description: Port 445 is generally a port for information circulation data, and hackers will generally use this port for you.
The computer is still controlled by Trojan Horse, and the version after windows2000 will automatically open this.
Port. General epidemic viruses, such as shock waves, shock waves and disaster flights, all come out from this port.
The computer is attacking!
Closing method: You can block port 445 by modifying the registry.
Add a key value
Configuration unit: HKEY _ Local _ Machine
Key: System \ Control Set \ Service \ Network \ Parameter
Name: SMBDeviceEnabled
Type: REG_DWORD
Value: 0
Restart the machine after modification.
1025:
Ports assigned by NetSpy.698 applications
45: Message processing module
See/u/1221519137 for details.