This document lists the names of various Trojan horse programs, the ports they use, and whether they use TCP or UDP. It includes over 100 Trojans ranging from well-known ones like SubSeven to more obscure ones like Shit Heep and Voodoo Doll. Many target common ports like 25, 21, and 80 to blend in with normal network traffic, while others use unusual high ports. Both TCP and UDP protocols are represented across the wide range of Trojans covered.
This document lists the names of various Trojan horse programs, the ports they use, and whether they use TCP or UDP. It includes over 100 Trojans ranging from well-known ones like SubSeven to more obscure ones like Shit Heep and Voodoo Doll. Many target common ports like 25, 21, and 80 to blend in with normal network traffic, while others use unusual high ports. Both TCP and UDP protocols are represented across the wide range of Trojans covered.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as TXT, PDF, TXT or read online from Scribd
This document lists the names of various Trojan horse programs, the ports they use, and whether they use TCP or UDP. It includes over 100 Trojans ranging from well-known ones like SubSeven to more obscure ones like Shit Heep and Voodoo Doll. Many target common ports like 25, 21, and 80 to blend in with normal network traffic, while others use unusual high ports. Both TCP and UDP protocols are represented across the wide range of Trojans covered.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as TXT, PDF, TXT or read online from Scribd