RE: Port-Knocking vulnerabilities?
- From: "Craig Wright" <Craig.Wright@xxxxxxxxxx>
- Date: Sat, 29 Dec 2007 06:48:50 +1100
Port Knocking is obfuscation and not a security technique. It was and is designed not as a security function, but as a channel to hide communications on compromised hosts.
It is a hacker toy and not a security tool. It is as effective as turning on the “IP Security” flags in a packet (just use hping and away you go).
Dr Craig Wright (GSE-Compliance)
Manager of Information Systems
Direct : +61 2 9286 5497
+61 417 683 914
BDO Kendalls (NSW)
Level 19, 2 Market Street Sydney NSW 2000
GPO BOX 2551 Sydney NSW 2001
Fax +61 2 9993 9497
Liability limited by a scheme approved under Professional Standards Legislation in respect of matters arising within those States and Territories of Australia where such legislation exists.
The information in this email and any attachments is confidential. If you are not the named addressee you must not read, print, copy, distribute, or use in any way this transmission or any information it contains. If you have received this message in error, please notify the sender by return email, destroy all copies and delete it from your system.
Any views expressed in this message are those of the individual sender and not necessarily endorsed by BDO Kendalls. You may not rely on this message as advice unless subsequently confirmed by fax or letter signed by a Partner or Director of BDO Kendalls. It is your responsibility to scan this communication and any files attached for computer viruses and other defects. BDO Kendalls does not accept liability for any loss or damage however caused which may result from this communication or any files attached. A full version of the BDO Kendalls disclaimer, and our Privacy statement, can be found on the BDO Kendalls website at http://www.bdo.com.au or by emailing administrator@xxxxxxxxxxx
BDO Kendalls is a national association of separate partnerships and entities.
From: listbounce@xxxxxxxxxxxxxxxxx [listbounce@xxxxxxxxxxxxxxxxx] On Behalf Of Tom Corelis [tomc@xxxxxxxxxxxxxxxxx]
Sent: Saturday, 29 December 2007 5:20 AM
To: Kappa Alpha Pi Eta
Subject: RE: Port-Knocking vulnerabilities?
I suppose you could do two successive port scans and hope the second
completes before the port-knockers' threshold.....
From: listbounce@xxxxxxxxxxxxxxxxx [mailto:listbounce@xxxxxxxxxxxxxxxxx]
On Behalf Of Kappa Alpha Pi Eta
Sent: Friday, December 28, 2007 7:12 AM
Subject: Port-Knocking vulnerabilities?
so I read this thread about port-knocking (altough called "reflexsive
firewalls"). I'd never heard of that and found that to be an very
interesting mechanism. Now I just keep wondering, what an attacker could
possibly do to intrude system secured in such a way. So there are no
open ports at all, also, there's no way the attacker could access the
computer physically or via social engineering. The attacker knows that a
knock-server is running and that there's some daemon waiting to become
accessible (what ever that may be).
What could a attacker do to somehow get access to that machine? And how
can I secure that machine from that kind of attacks.
Thanks in advance,
Express yourself instantly with MSN Messenger! Download today it's FREE!
- Prev by Date: RE: Port-Knocking vulnerabilities?
- Next by Date: microsoft updates
- Previous by thread: RE: Port-Knocking vulnerabilities?
- Next by thread: Re: Port-Knocking vulnerabilities?