Port No | 99 |
Service Name | NCX |
RFC Doc | 0 |
Protocol | TCP |
Description | This Trojan a modified version of the NETCAT for NT tool, which is used for reading or writing data across network connections using the Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) protocols. This modified version acts as a backdoor Trojan that allows a remote user access to the infected computer. |
Reference Link | NCX |
Attack | Details: This Trojan program is part of the demo program ceated by eEye Digital Security Team to show the exploits of Internet Information Server (IIS) in Windows NT. The team created a tool that runs the hacked version of NETCAT.EXE, which is NCX.EXE on an infected system. The Trojan uses Transmission Control Protocol/User Datagram Protocol (TCP/UDP) to connect to a target system. Upon connection, the Trojan displays the following on the screen of any remote user connected to the infected system. |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.