Start menu> Run> type netstat -a
For Example,
Run> netstat -a
It will say the following thing but depending on the user regestired to the compurer will have a different name:
Active Connections
Proto Local Address Foreign Address State
TCP ankit:1031 dwarf.box.sk:ftp ESTABLISHED
TCP ankit:1036 dwarf.box.sk:ftp-data TIME_WAIT
TCP ankit:1043 banners.egroups.com:80 FIN_WAIT_2
TCP ankit:1045 mail2.mtnl.net.in
op3 TIME_WAIT
TCP ankit:1052 zztop.boxnetwork.net:80 ESTABLISHED
TCP ankit:1053 mail2.mtnl.net.in
op3 TIME_WAIT
UDP ankit:1025 *:*
UDP ankit:nbdatagram *:*
Now, let us take a single line from the above output and see what it stands for:
Proto Local Address Foreign Address State
TCP ankit:1031 dwarf.box.sk:ftp ESTABLISHED
Now, the above can be arranged as below:
Proto-col: TCP (This can be Transmission Control Proto-col or TCP, User Datagram Proto-col or UDP or sometimes even, IP or Internet Proto-col.)
Local System Name: ankit (This is the name of the local system that you set during the Windows setup.)
Local Port opened and being used by this connection: 1031
Remote System: dwarf.box.sk (This is the non-numerical form of the system to which we are connected.)
Remote Port: ftp (This is the port number of the remote system dwarf.box.sk to which we are connected.)
State of Connection: ESTABLISHED
‘Netstat’ with the ‘-a’ argument is normally used, to get a list of open ports on your own system i.e. on the local system. This can be particularly useful to check and see whether your system has a Trojan installed or not. Yes, most good Antiviral software are able to detect the presence of Trojans, but, we are hackers, and need to software to tell us, whether we are infected or not. Besides, it is more fun to do something manually than to simply click on the ‘Scan’ button and let some software do it.
The following is a list of Trojans and the port numbers which they use, if you Netstat yourself and find any of the following open, then you can be pretty sure, that you are infected.
Port 12345(TCP) Netbus
Port 31337(UDP) Back Orifice
Port 27374 SubSeven
Port 901, 902, 903 NetDevil
anyway, the ports are often changed, so you cant detect them . just keep in mind, icq is 5190, http is 80, ftp is 21, edonkey is 6221 afair, the rest would be suspicious (forgot bnet port, doesnt matter)
Trojan Ports
31 = Master Paradise
121 = BO jammerkillahV
456 = HackersParadise
555 = Phase Zero
666 = Attack FTP
1001 = Silencer
1001 = Silencer
1001 = WebEx
1010 = Doly Trojan 1.30 (Subm.Cronco)
1011 = Doly Trojan 1.1+1.2
1015 = Doly Trojan 1.5 (Subm.Cronco)
1033 = Netspy
1042 = Bla1.1
1170 = Streaming Audio Trojan
1207 = SoftWar
1243 = SubSeven
1245 = Vodoo
1269 = Maverick's Matrix
1492 = FTP99CMP
1509 = PsyberStreamingServer Nikhil G.
1600 = Shiva Burka
1807 = SpySender
1981 = ShockRave
1999 = Backdoor
1999 = Transcout 1.1 + 1.2
2001 = DerSpaeher 3
2001 = TrojanCow
2023 = Pass Ripper
2140 = The Invasor Nikhil G.
2283 = HVL Rat5
2565 = Striker
2583 = Wincrash2
2801 = Phineas Nikhil G.
3791 = Total Eclypse (FTP)
4567 = FileNail Danny
4950 = IcqTrojan
4950 = IcqTrojen
5000 = Socket23
5011 = OOTLT
5031 = NetMetro1.0
5400 = BladeRunner
5400 = BackConstruction1.2
5521 = IllusionMailer
5550 = XTCP 2.0 + 2.01
5569 = RoboHack
5742 = Wincrash
6400 = The tHing
6669 = Vampire 1.0
6670 = Deep Throat
6883 = DeltaSource (DarkStar)
6912 = Shitheep
6939 = Indoctrination
7306 = NetMonitor
7789 = iCkiller
9872 = PortalOfDoom
9875 = Portal of Doom
9989 = iNi-Killer
9989 = InIkiller
10607 = Coma Danny
11000 = SennaSpyTrojans
11223 = ProgenicTrojan
12076 = Gjamer
12223 = Hack´99 KeyLogger
12346 = NetBus 1.x (avoiding Netbuster)
12701 = Eclipse 2000
16969 = Priotrity
20000 = Millenium
20034 = NetBus Pro
20203 = Logged!
20203 = Chupacabra
20331 = Bla
21544 = GirlFriend
21554 = GirlFriend
22222 = Prosiak 0.47
23456 = EvilFtp
27374 = Sub-7 2.1
29891 = The Unexplained
30029 = AOLTrojan1.1
30100 = NetSphere
30303 = Socket25
30999 = Kuang
31787 = Hack'a'tack
33911 = Trojan Spirit 2001 a
34324 = Tiny Telnet Server
34324 = BigGluck TN
40412 = TheSpy
40423 = Master Paradise
50766 = Fore
53001 = RemoteWindowsShutdown
54320 = Back Orifice 2000 (default port)
54321 = Schoolbus 1.6+2.0
61466 = Telecommando
65000 = Devil 1.03
Even more Ports (no trojan)
LIST HERE (33k)