PORT KNOCKING
==========================================================
======Some Knowledge :
#Nothing on the nmap scan? But you found a cool and strange sequence of numbers? Lets try Port knocking.
When you "knock" on a port you are really just sending TCP-packets with SYN-flag to that port. The closed port will then respond with a ACK/RST. This basically means that the host has received the TCP-packet and - it ACKnolwdge it, but responds with a Reset (RST) flag.
RST just means that the port is closed.
======Nmap & Bash Script :
for x in 4000 5000 6000; do #change the range with your
nmap -Pn --host-timeout 201 --max-retries 0 -p $x $IP;
done
ssh User@$IP -p <port> #or you can use ‘nc -nv $IP 22’
===================================================================
=================port knocking :https://en.wikipedia.org/wiki/Port_knocking :
>>> knock 10.10.29.172 7864 8273 9241 12007 60753 && sleep 1 && rustscan -a 10.10.29.172 -b 65535
>>>for x in 4000 5000 6000; do nmap -Pn --host_timeout 201 --max-retries 0 -p $x server_ip_address; done
>>> nc <IP> port
>>>knock <IP> port
>>> for x in 7000 8000 9000; do nmap -Pn –host_timeout 201 –max-retries 0 -p $x 1.1.1.1; done
NOTE : after knocking the port urgently run a full port scan.
Last updated