RE: Port-Knocking vulnerabilities?

Port Knocking is obfuscation and not a security technique. It was and is designed not as a security function, but as a channel to hide communications on compromised hosts.

It is a hacker toy and not a security tool. It is as effective as turning on the “IP Security” flags in a packet (just use hping and away you go).

Dr Craig Wright (GSE-Compliance)

Craig Wright
Manager of Information Systems

Direct : +61 2 9286 5497
+61 417 683 914

BDO Kendalls (NSW)
Level 19, 2 Market Street Sydney NSW 2000
GPO BOX 2551 Sydney NSW 2001
Fax +61 2 9993 9497

Liability limited by a scheme approved under Professional Standards Legislation in respect of matters arising within those States and Territories of Australia where such legislation exists.

The information in this email and any attachments is confidential. If you are not the named addressee you must not read, print, copy, distribute, or use in any way this transmission or any information it contains. If you have received this message in error, please notify the sender by return email, destroy all copies and delete it from your system.

Any views expressed in this message are those of the individual sender and not necessarily endorsed by BDO Kendalls. You may not rely on this message as advice unless subsequently confirmed by fax or letter signed by a Partner or Director of BDO Kendalls. It is your responsibility to scan this communication and any files attached for computer viruses and other defects. BDO Kendalls does not accept liability for any loss or damage however caused which may result from this communication or any files attached. A full version of the BDO Kendalls disclaimer, and our Privacy statement, can be found on the BDO Kendalls website at or by emailing administrator@xxxxxxxxxxx

BDO Kendalls is a national association of separate partnerships and entities.


From: listbounce@xxxxxxxxxxxxxxxxx [listbounce@xxxxxxxxxxxxxxxxx] On Behalf Of Tom Corelis [tomc@xxxxxxxxxxxxxxxxx]
Sent: Saturday, 29 December 2007 5:20 AM
To: Kappa Alpha Pi Eta
Cc: security-basics@xxxxxxxxxxxxxxxxx
Subject: RE: Port-Knocking vulnerabilities?

I suppose you could do two successive port scans and hope the second
completes before the port-knockers' threshold.....

Tom Corelis

-----Original Message-----
From: listbounce@xxxxxxxxxxxxxxxxx [mailto:listbounce@xxxxxxxxxxxxxxxxx]
On Behalf Of Kappa Alpha Pi Eta
Sent: Friday, December 28, 2007 7:12 AM
To: security-basics@xxxxxxxxxxxxxxxxx
Subject: Port-Knocking vulnerabilities?

Hi listers.

so I read this thread about port-knocking (altough called "reflexsive
firewalls"). I'd never heard of that and found that to be an very
interesting mechanism. Now I just keep wondering, what an attacker could
possibly do to intrude system secured in such a way. So there are no
open ports at all, also, there's no way the attacker could access the
computer physically or via social engineering. The attacker knows that a
knock-server is running and that there's some daemon waiting to become
accessible (what ever that may be).
What could a attacker do to somehow get access to that machine? And how
can I secure that machine from that kind of attacks.

Thanks in advance,
Express yourself instantly with MSN Messenger! Download today it's FREE!

Relevant Pages

  • RE: Port-Knocking vulnerabilities?
    ... You obviously haven't looked into the technology and don't understand basic concepts of authentication. ... I posted this for the benefit of those on the list that are truly trying to learn security basics. ... Subject: Port-Knocking vulnerabilities? ... what an attacker could ...
  • RE: Port-Knocking vulnerabilities?
    ... Network Security Officer ... Port knocking) you can sniff packets and capture for analysis. ... not necessarily endorsed by BDO Kendalls. ... If an attacker can do that, ...
  • Re: Security problem
    ... simply to use a non-standard port. ... and no attacker will ever find it. ... There is a reason why you build up security in layers, rather than relying on a single point such as a good password. ... Security is about balancing the risks and the consequences of these risks with the cost of protection and the ease of use of legitimate services. ...
  • [NT] Microsoft Distributed Transaction Controller Packet Relay DoS (MS05-051)
    ... Get your security news from a reliable source. ... flood systems with connection attempts from legitimate MSDTC servers. ... TIP protocol that allows a remote IP address and port number to be ... attacker can force an error and cause the DTC service to connect to the ...
  • Re: SSH attacks?
    ... > That practice affords no security benefit. ... It certainly does afford a security benefit. ... on a nonstandard port ... Will an attacker who is specifically trying to ...