Security Basics mailing list archives

Re: IP/TCP/UDP Protocol Vulnerability List


From: krymson () gmail com
Date: 11 Feb 2008 21:05:28 -0000

This search will pull up plenty:
http://www.google.com/search?hl=en&q=tcp+port+assignments&aq=f


Of note, those aren't vulnerabilities in tcp/udp ports, just port assigments and common programs that listen/use those 
ports. I can put any program I want on nearly any port I want. The vulnerabilities lie in the application using those 
ports.  You can truly only verify that by examining the box or attempting to fingerprint the listening application.


Current thread: