Port No | 6000 |
Service Name | x11 |
RFC Doc | 0 |
Protocol | TCP |
Description | X-Window System. X11 ports to support remote x-windows sessions. Sessions are vulnerable to spoofing, session hijacking, capture of user screen data, keystroke monitoring, insertion of hostile keystrokes & commands, data diddling, and DOS. Review x-windows security techniques; do not run default x-windows server config's in production environment!. |
Reference Link | More Information |
Attack | Name:NetBus BO can be removed by deleting the server and removing its registry entry. If possible, you should back up all user data, format your hard drive, and reinstall all operating systems and software on the infected machine. However, if someone has installed BO on your machine, then it is most likely part of a larger security breach. You should act according to your site security policy. |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.