Browse Definitions:
Definition

port 9875 (port of doom)

Contributor(s): Matthew Haughn, Carrie Higbie

Port 9875 is a port often associated with setting up VoIP (voice over IP) communications. The port is also notorious as an attack vector for the Portal of Doom Trojan horse; as a result, port 9875 is sometimes referred to as the Port of Doom.

Port 9875 is registered with the Internet Assigned Numbers Authority (IANA) for session announcement. The session announcement protocol (SAP) defines the format and describes the information that will be exchanged during a multicast conferencing session. The VoIP system traffic directed to the port communicates the start and stop of a session if this is the port expected by the system. Port 9875 uses the IP network standard TCP (Transmission Control Protocol), which guarantees the delivery of data packets in the order in which they were sent.

Malicious hackers can use the Portal of Doom Trojan to look for sensitive data, such as credit card numbers and information that enables identity theft, or just to cause mischief. The Trojan can enter without causing any behavior that alerts the user and does not have to trick the user into running an executable file manually.

This was last updated in March 2016

Continue Reading About port 9875 (port of doom)

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

SearchSecurity

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

  • keylogger (keystroke logger or system monitor)

    A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and ...

  • password

    A password is an unspaced sequence of characters used to determine that a computer user requesting access to a computer system is...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks to ...

  • data migration

    Data migration is the process of transferring data between data storage systems, data formats or computer systems.

  • compact disc (CD)

    A compact disc is a portable storage medium that can be used for recording, storing and playing back audio, video and other data ...

SearchSolidStateStorage

  • NVMe (non-volatile memory express)

    NVMe (non-volatile memory express) is a host controller interface and storage protocol to enable a solid-state drive to use the ...

  • SSD RAID (solid-state drive RAID)

    SSD RAID (solid-state drive RAID) is a methodology commonly used to protect data by distributing redundant data blocks across ...

  • Tier 0

    Tier 0 (tier zero) is a level of data storage that is faster, and perhaps more expensive, than any other level in the storage ...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close