---
title: "6667 - Irc"
weight: 6667
date: "2026-03-10T10:03:28+08:00"
lastmod: "2026-03-10T13:26:55+08:00"
---

💡 **学习提示**: 本文档介绍 **Irc** 的渗透测试方法，适合信息安全初学者和从业人员参考。

⚠️ **法律声明**: 本文档仅供学习和授权测试使用。未经授权的系统测试可能违反法律法规。

---

> ⚠️ **法律声明**: 本文档仅供学习和授权测试使用。未经授权的系统测试可能违反法律法规。

## 194,6667,6660-7000 - 渗透测试 IRC

### 基本信息

IRC, initially a **plain text protocol**, was assigned **194/TCP** by IANA but is commonly run on **6667/TCP** and similar ports to avoid needing **root privileges** for operation.

A **nickname** is all that's needed to connect to a server. Following connection, the server performs a reverse-DNS lookup on the user's IP.

Users are divided into **operators**, who need a **username** and **password** for more access, and regular **users**. Operators have varying levels of privileges, with administrators at the top.

**默认 ports:** 194, 6667, 6660-7000

```
PORT     STATE SERVICE
6667/tcp open  irc
```

### 信息收集

#### Banner

IRC can support **TLS**.

```bash
nc -vn <IP> <PORT>
openssl s_client -connect <IP>:<PORT> -quiet
```

#### Manual

Here you can see how to connect and access the IRC using some **random nickname** and then enumerate some interesting info. You can learn more commands of IRC [here](https://en.wikipedia.org/wiki/List_of_Internet_Relay_Chat_commands#USERIP).

```bash
#Connection with random nickname
USER ran213eqdw123 0 * ran213eqdw123
NICK ran213eqdw123
#If a PING :<random> is responded you need to send
#PONG :<received random>

VERSION
HELP
INFO
LINKS
HELPOP USERCMDS
HELPOP OPERCMDS
OPERATOR CAPA
ADMIN      #Admin info
USERS      #Current number of users
TIME       #Server's time
STATS a    #Only operators should be able to run this
NAMES      #List channel names and usernames inside of each channel -> Nombre del canal y nombre de las personas que estan dentro
LIST       #List channel names along with channel banner
WHOIS <USERNAME>      #WHOIS a username
USERHOST <USERNAME>   #If available, get hostname of a user
USERIP <USERNAME>     #If available, get ip of a user
JOIN <CHANNEL_NAME>   #Connect to a channel

#Operator creds Brute-Force
OPER <USERNAME> <PASSWORD>
```

You can, also, atttempt to login to the server with a password. The default password for ngIRCd is `wealllikedebian`.

```bash
PASS wealllikedebian
NICK patrick
USER test1 test2 <IP> :test3
```

#### **Find and scan IRC services**

```bash
nmap -sV --script irc-botnet-channels,irc-info,irc-unrealircd-backdoor -p 194,6660-7000 <ip>
```

#### [暴力破解](../generic-hacking/brute-force.md#irc)

#### Shodan

```bash
# Shodan 搜索语法
port:6667
```

#### ZoomEye

```bash
# ZoomEye 搜索语法
port:6667
```

---

## 📖 参考资料

- [HackTricks - 6667-irc](https://book.hacktricks.wiki/en/network-services-pentesting/6667-irc.html)

