Threat Level: green Handler on Duty: Manuel Pelaez

SANS ISC Port Details:


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Graph

[show ascii data]
Graph Criteria
  • Start Date:
  • End Date:
  • Port:
  • Left Y Axis:
  • Right Y Axis:

Port Information

Protocol Service Name
tcp radmin Remote Administrator default port
[get complete service list]

User Comment

Submitted By Date
Comment
Timo Steffens 2009-10-04 18:34:16
On the following forum there is a post (#13) describing how to determine whether a packet was really intended for radmin (static identification data) : http://www.governmentsecurity.org/forum/index.php?showtopic=7866
2004-10-28 05:52:28
http://www.pestpatrol.com/PestInfo/r/remote_administrator__rat_.asp
Ronaldo Vasconcellos 2004-08-23 22:42:38
Paulo Sedrez 2004-07-23 04:58:32
There is a known remote exploitable vulnerability in radmin server versions 2.0 and 2.1 that allows code execution.
Add a comment

CVE Links

CVE # Description