current position：Home>Who peeped on the industrial computer?
Who peeped on the industrial computer?
2022-05-15 07:50:07【Irteam - Industrial Safety】
Because there are a lot of back doors of industrial control software and Trojans bundled in the system , It will let your industrial computer open many communication ports , These communication ports are automatically connected to the outside IP Or a website, etc .
So use a free little software today , To thoroughly check your industrial computer , Which hidden ports are open , Outreach to IP？ This software uses go Language development , Can run in 64 Bit windows System , You don't need to install it, just run it directly .（ Sure copy To u pan , Anytime PC Check the machine once ）
This software is called JST-Port, As the name suggests, it means jiansiting port query . This software consists of two parts , One is JST-port.exe Executable file , The other is JST-port.dll The library files . You just need to double-click JST-port.exe The following screen will appear ：
Let you enter a file name generated after detection , The file name follows windows Just name the file , Otherwise, an error will be reported and the detected file cannot be generated . for example , Input ：local
stay JST-port.exe Automatically generate a... In the same directory local.csv The file of .
Open this file and you can see in your industrial computer , Which programs open which ports , And what are they connected to IP The address is clear at a glance .
In order to let everyone see more clearly , I put one line of information copy come out , You can see what items are included .
Check list：Process name| Process ID | Protocol | Local port | Local port name | Local address | Remote port | Remote port name | Remote address | Remote host name | State | Send Bytes | Received Bytes | Send Packets | Received Packets | Process path | Product name | File description | File version | Company | Process created on | User name | Process service | Process attributes | Added on | Creation timestamp | Module filename | Remote IP country | Remote IP ASN | Remote IP company | Windows title
Finally, attach the download address of the software ：
author[Irteam - Industrial Safety],Please bring the original link to reprint, thank you.
The sidebar is recommended
- Which securities company does qiniu school recommend? Is it safe to open an account
- Hyperstyle: complete face inversion using hypernetwork
- What activities are supported by the metauniverse to access reality at this stage?
- P2P swap OTC trading on qredo
- Google | coca: the contrast caption generator is the basic image text model
- SIGIR 2022 | Huawei reloop: self correcting training recommendation system
- Whether you want "melon seed face" or "national character face", the "face changing" technology of Zhejiang University video can be done with one click!
- Sorting of naacl2022 prompt related papers
- Servlet create project
- "Chinese version" Musk was overturned by the original: "if it's true, I want to see him"
guess what you like
[network security] web security trends and core defense mechanisms
[intensive reading] object detection series (10) FPN: introducing multi-scale with feature pyramid
007. ISCSI server chap bidirectional authentication configuration
plot_ Importance multi classification, sorting mismatch, image value not displayed
[intensive reading] object detection series (XI) retinanet: the pinnacle of one stage detector
How to install MFS environment for ECS
[intensive reading] the beginning of object detection series (XII) cornernet: anchor free
Open source sharing -- a record of students passing through time
MOT：A Higher Order Metric for Evaluating Multi-object Tracking
- How to develop a distributed memory database (1)
- Reverse engineers reverse restore app and code, and localization is like this
- One line command teaches you how to export all the libraries in anaconda
- Bi tools are relatively big. Let's see which one is most suitable for you
- Read the history of database development
- Self cultivation of coder - batterymanager design
- Technology application of swift phantom type phantom in Apple source code learning
- Swiftui advanced skills: what is the use of the technology of swift phantom type phantom
- Swiftui advanced animation Encyclopedia of complex deformation animation is based on accelerate and vector arithmetic (tutorial includes source code)
- What problems remain unsolved in swiftui in 2022
- I'll set the route for fluent
- Flutter drawing process analysis and code practice
- Emoji language commonly used icon collection (interesting Emoji)
- 5.14 comprehensive case 2.0 - automatic induction door
- How to deploy redis service on k8s top?
- Importance of data warehouse specification
- Idea automatically generates serialization ID
- Why is it recommended not to use select * in MySQL?
- Let's talk about why redis needs to store two data structures for the same data type?
- Domain lateral move RDP delivery
- [learn slam orb_slam2 or slam3 from scratch] summary of all blog articles
- 20000 + star ultra lightweight OCR system pp-ocrv3 effect increased by 5% - 11%!
- A configurable canvas clock - Super multi style
- The pp-ocrv3 effect of 20000 + star ultra lightweight OCR system is further improved by 5% - 11%
- MySQL's golden rule: "don't use select *"
- True interview question: why does redis store a data type twice?
- High threshold for large factories? Five exclusive PDFs inside Alibaba will take you forward and win the offer
- Is it really hard to find a job? How on earth can I find a job with high salary without worrying about being laid off
- How to design knowledge center? (code attached)
- OWASP top 10 vulnerability analysis
- Are you still writing comment templates manually? Idea can generate annotation templates of classes and methods with one click. Click in if you don't know
- Numpy core syntax and code sorting summary!
- Can you believe that the swoole timer can realize millisecond task scheduling?
- Detailed explanation of art template engine
- Telephone subsystem of openharmony source code analysis -- call flow
- Yixin Huachen: how to do a good job in digital transformation in the power industry?
- One stop collaboration is really delicious - apipost
- Notes on modern algebra and series of questions: Chapter 1 (introduction of algebraic system)
- Notes on modern algebra and serialization of question types: Chapter 2 (properties of binary operation)