[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [FW-1] list of ports used in exploits/hacks
Yes, There are even several, go to the following site that lists some of them : http://www.rtek2000.com/Tech/InternetSecureLinks.html Follow the "General Protocols/Services" link Met vriendelijke groeten - Bien à vous - Kind regards Guy ROELANDTS EMEA GS Internet Expertise Centre - CCSA & CCSE Compaq Software Engineer - Belgium E-mail : [email protected] Tel: +32(02)729.77.44 (options 3 - 3 - 1) Fax: +32(02)729.77.65 ===================================================================== This message may contain confidential and/or proprietary information, and is intended only for the person/entity to whom it was originally addressed. The content of this message may contain private views and opinions which do not constitute a formal disclosure or commitment unless specifically stated. Should you receive this message by mistake please inform the sender immediately. ===================================================================== -----Original Message----- From: Kim Longenbaugh [mailto:[email protected]] Sent: Tuesday, November 20, 2001 2:46 PM To: [email protected] Subject: [FW-1] list of ports used in exploits/hacks Is there a listing of ports used in hacks/exploits available? That would come in pretty handy and might be more useful for anyone trying to find out if they're being attacked than the regular list of ports. =============================================== To unsubscribe from this mailing list, please see the instructions at http://www.checkpoint.com/services/mailing.html =============================================== =============================================== To unsubscribe from this mailing list, please see the instructions at http://www.checkpoint.com/services/mailing.html ===============================================
|