Port No | 12000 |
Service Name | solaris cluster |
RFC Doc | 0 |
Protocol | TCP |
Description | Solaris Cluster v2.x opens this port. When enabled, remote attaker can read host's syslog and view cluster config info. If attacker has a local account, can create a symbolic link in /var/opt/SUNWcluster/fm/fmstatus/nfs/ |
Reference Link | More Information |
Attack | NameReverse Trojan: Trojan: aka Trojan Horse: A Trojan is a software program that enables an attacker to get nearly complete control over an infected PC. Frequently used by as a tool by malicious hackers. When this program executes, the program performs a specific set of actions, usually working toward the goal of allowing the trojan to survive on a system and open up a backdoor. |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.