what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 50 RSS Feed

Files

Fwknop Port Knocking Utility 2.5
Posted Jul 22, 2013
Authored by Michael Rash | Site cipherdyne.org

fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.

Changes: This release added support for HMAC SHA-256 authenticated encryption in the encrypt-then-authenticate model. Many bugs discovered by the Coverity static analyzer were fixed. OpenSSL compatibility tests were added to the test suite. Client stanza saving ability was added for the ~/.fwknoprc file, simplifying fwknop client usage. The ability to automatically generate both Rijndael and HMAC keys with --key-gen was added.
tags | tool, scanner, vulnerability
systems | unix
SHA-256 | ebf0f5a55992e516fa44063993cbcc51bb9555cef769ac9ab5d8be77a8df99dc

Related Files

Fwknop Port Knocking Utility
Posted Jun 13, 2008
Authored by Michael Rash | Site cipherdyne.org

fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.

Changes: Various updates and additions. Removed legacy knopmd.conf file since knopmd uses the fwknop.conf file instead.
tags | tool, scanner, vulnerability
systems | unix
SHA-256 | dcb1e7c56142881d9ede36c33467ced19afcf30898134c38a0ad4b49b7a7dc3c
Fwknop Port Knocking Utility
Posted Jun 2, 2008
Authored by Michael Rash | Site cipherdyne.org

fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.

Changes: Added two new port randomization options. Various module additions and bug fixes.
tags | tool, scanner, vulnerability
systems | unix
SHA-256 | 38f028cd62f36b27e390174472bbd35cf86b5d227e6acfb91353c80aef0b6ca0
Fwknop Port Knocking Utility
Posted Apr 8, 2008
Authored by Michael Rash | Site cipherdyne.org

fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.

Changes: Added MASQUERADE and SNAT support. Added hex_dump() feature. Some minor bug fixes.
tags | tool, scanner, vulnerability
systems | unix
SHA-256 | 9fea0328c9bc110b187da529ec186ac3bb3ba08ef95dde78f1b50625942b5a35
Fwknop Port Knocking Utility
Posted Mar 17, 2008
Authored by Michael Rash | Site cipherdyne.org

fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.

Changes: Added more granular source IP and allowed IP tests so that access to particular internal IP addresses can be excluded in --Forward-access. Added BLACKLIST functionality to allow source IP addresses to easily be excluded from the authentication process. Various other bug fixes and additions.
tags | tool, scanner, vulnerability
systems | unix
SHA-256 | 918dfe42d7a552e44b74c2bf3ba49f7a160d0c31f093cfbdc4efdf4bd73fc1f8
Fwknop Port Knocking Utility
Posted Jan 28, 2008
Authored by Michael Rash | Site cipherdyne.org

fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.

Changes: Added ENABLE_OUTPUT_ACCESS keyword to access.conf file parsing. Added command line argument display to fwknop client --verbose mode. Various other extensive updates and additions.
tags | tool, scanner, vulnerability
systems | unix
SHA-256 | 9c097761644f7cbf79a72b6aadd95384ab2965187bb8d9f8346c7de9905db08d
Fwknop Port Knocking Utility
Posted Dec 18, 2007
Authored by Michael Rash | Site cipherdyne.org

fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.

Changes: Extensive additions and updates.
tags | tool, scanner, vulnerability
systems | unix
SHA-256 | a5049331fd404514f4b723536db88d3b79b8b21537ecdf2d617a888b84101b37
Fwknop Port Knocking Utility
Posted Nov 26, 2007
Authored by Michael Rash | Site cipherdyne.org

fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.

Changes: Multiple additions, some updates, and a bug fix.
tags | tool, scanner, vulnerability
systems | unix
SHA-256 | 366dbb0c9ae38973cee960408eb1a76ed6ff544f15855affaed93331face9491
Fwknop Port Knocking Utility
Posted Sep 19, 2007
Authored by Michael Rash | Site cipherdyne.org

fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.

Changes: Added fwknopd server support for Mac OS X. Various other bug fixes and improvements.
tags | tool, scanner, vulnerability
systems | unix
SHA-256 | ac87bac78e9396f01d93b9abe1dab1d480a5be4898c824ca464ce1c82fca89a7
Fwknop Port Knocking Utility
Posted Jun 6, 2007
Authored by Michael Rash | Site cipherdyne.org

fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.

Changes: Added support for ipfw firewalls. Added init script for FreeBSD systems. Various other additions and updates.
tags | tool, scanner, vulnerability
systems | unix
SHA-256 | 3d63f585dc5fcdbe56fc900d442168c00d79d149b4596cd0f514d17c8a2f28c3
Fwknop Port Knocking Utility
Posted Jan 13, 2007
Authored by Michael Rash | Site cipherdyne.org

fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.

Changes: Various updates and bug fixes.
tags | tool, scanner, vulnerability
systems | unix
SHA-256 | 7730b4cbc522502f2d12a5b895c6618321b649f03a6a1b3ab8ccc5ec191fc8c6
Fwknop Port Knocking Utility
Posted Nov 7, 2006
Authored by Michael Rash | Site cipherdyne.org

fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.

Changes: Various bug fixes and some enhanced validation.
tags | tool, scanner, vulnerability
systems | unix
SHA-256 | ff771ee9498fde005fdae01e8fe2f1a0ea0658aed9248a72ad4d0ad91be23dc0
Fwknop Port Knocking Utility
Posted Oct 19, 2006
Authored by Michael Rash | Site cipherdyne.org

fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.

Changes: Various enhancements and improvements. Some bug fixes.
tags | tool, scanner, vulnerability
systems | unix
SHA-256 | 620ca600520996f14cf2f951f7927caa188d6310b909213bec9af13c97c15758
Fwknop Port Knocking Utility
Posted Oct 5, 2006
Authored by Michael Rash | Site cipherdyne.org

fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.

Changes: Various enhancements and improvements.
tags | tool, scanner, vulnerability
systems | unix
SHA-256 | 8cb35d6f95e9757abe80d2a141a661e06aa63c8b219f0c70cbe8ab5799d90762
Fwknop Port Knocking Utility
Posted Aug 17, 2006
Authored by Michael Rash | Site cipherdyne.org

fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.

Changes: Added fwknop_serv to function as a minimal TCP server. Updated to CRYPT:CBC 2.18. Various other bug fixes and enhancements.
tags | tool, scanner, vulnerability
systems | unix
SHA-256 | a0c9f9c04bd5b01067c0f59a31293b75bf385afe331f33448a84bc0178cfd22a
Fwknop Port Knocking Utility
Posted Jan 15, 2006
Authored by Michael Rash | Site cipherdyne.org

fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.

Changes: Added GPG based authentication capability for SPA packets. Added patch against OpenSSH-4.2p1 to integrate SPA mode. Various other additions, enhancements, and bug fixes.
tags | tool, scanner, vulnerability
systems | unix
SHA-256 | 61d9bcf837b6f1d1377469a0a3e005aadb67c39ef8476883d92e35767c09da02
Fwknop Port Knocking Utility
Posted Oct 6, 2005
Authored by Michael Rash | Site cipherdyne.org

fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.

Changes: Various additions and bug fixes.
tags | tool, scanner, vulnerability
systems | unix
SHA-256 | 07289220d1f6fa9897099dfaab158ed855928fe5e76bc56335f332f9b174d48d
Fwknop Port Knocking Utility
Posted Sep 22, 2005
Authored by Michael Rash | Site cipherdyne.org

fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.

Changes: Various additions and bug fixes.
tags | tool, scanner, vulnerability
systems | unix
SHA-256 | 1a3db5f2e2e6ce86ed40c3650a3ac8263074d2683f7116fb900836068593d41c
Fwknop Port Knocking Utility
Posted Aug 31, 2005
Authored by Michael Rash | Site cipherdyne.org

fwknop is a flexible port knocking implementation that is based around iptables. Both shared knock sequences and encrypted knock sequences are supported. In addition, fwknop makes use of passive OS fingerprinting signatures derived from p0f to ensure the OS that initiates a knock sequence conforms to a specific type. This makes it possible to allow, say, only Linux systems to connect to your SSH daemon. Both the knock sequences and OS fingerprinting are completely implemented around iptables log messages, and so a separate packet capture library is not required.

Changes: Various additions and bug fixes.
tags | tool, scanner
systems | linux, unix
SHA-256 | f02236fc30cbe288fd42dbfa3aaf09934b181da64e3cb5b345617760a0ca29a1
Fwknop Port Knocking Utility
Posted Aug 10, 2005
Authored by Michael Rash | Site cipherdyne.org

fwknop is a flexible port knocking implementation that is based around iptables. Both shared knock sequences and encrypted knock sequences are supported. In addition, fwknop makes use of passive OS fingerprinting signatures derived from p0f to ensure the OS that initiates a knock sequence conforms to a specific type. This makes it possible to allow, say, only Linux systems to connect to your SSH daemon. Both the knock sequences and OS fingerprinting are completely implemented around iptables log messages, and so a separate packet capture library is not required.

Changes: Various additions and bug fixes.
tags | tool, scanner
systems | linux, unix
SHA-256 | 0a520e3c38a739137e87994d28fde5a66577e3724f3f49d5b1a0a5e7d0c1d509
Fwknop Port Knocking Utility
Posted Aug 5, 2005
Authored by Michael Rash | Site cipherdyne.org

fwknop is a flexible port knocking implementation that is based around iptables. Both shared knock sequences and encrypted knock sequences are supported. In addition, fwknop makes use of passive OS fingerprinting signatures derived from p0f to ensure the OS that initiates a knock sequence conforms to a specific type. This makes it possible to allow, say, only Linux systems to connect to your SSH daemon. Both the knock sequences and OS fingerprinting are completely implemented around iptables log messages, and so a separate packet capture library is not required.

Changes: Various additions and bug fixes.
tags | tool, scanner
systems | linux, unix
SHA-256 | 4558b54d776b68b063d77a3447077ba60dce5615f78eb6d628c1ce184319f24e
Fwknop Port Knocking Utility
Posted Jun 1, 2005
Authored by Michael Rash | Site cipherdyne.org

fwknop is a flexible port knocking implementation that is based around iptables. Both shared knock sequences and encrypted knock sequences are supported. In addition, fwknop makes use of passive OS fingerprinting signatures derived from p0f to ensure the OS that initiates a knock sequence conforms to a specific type. This makes it possible to allow, say, only Linux systems to connect to your SSH daemon. Both the knock sequences and OS fingerprinting are completely implemented around iptables log messages, and so a separate packet capture library is not required.

Changes: Added new authorization mode. Updated man page and there are a few other additions to the functionality.
tags | tool, scanner
systems | linux, unix
SHA-256 | 0e104718c305f413ce87cd7d283f8614932827f22ae91bff47223ca54cb47f56
Fwknop Port Knocking Utility
Posted Mar 22, 2005
Authored by Michael Rash | Site cipherdyne.org

fwknop is a flexible port knocking implementation that is based around iptables. Both shared knock sequences and encrypted knock sequences are supported. In addition, fwknop makes use of passive OS fingerprinting signatures derived from p0f to ensure the OS that initiates a knock sequence conforms to a specific type. This makes it possible to allow, say, only Linux systems to connect to your SSH daemon. Both the knock sequences and OS fingerprinting are completely implemented around iptables log messages, and so a separate packet capture library is not required.

Changes: Various additions and reworks.
tags | tool, scanner
systems | linux, unix
SHA-256 | cc78b9428e15e70890d6f053d4858871508416a5f26d141773d0f19d695197be
Fwknop Port Knocking Utility
Posted Oct 1, 2004
Authored by Michael Rash | Site cipherdyne.org

fwknop is a flexible port knocking implementation that is based around iptables. Both shared knock sequences and encrypted knock sequences are supported. In addition, fwknop makes use of passive OS fingerprinting signatures derived from p0f to ensure the OS that initiates a knock sequence conforms to a specific type. This makes it possible to allow, say, only Linux systems to connect to your SSH daemon. Both the knock sequences and OS fingerprinting are completely implemented around iptables log messages, and so a separate packet capture library is not required.

Changes: Added init script for Fedora systems. Added --Kill, --Restart, and --Status modes.
tags | tool, scanner
systems | linux, unix
SHA-256 | c681d25dce87be973e406ee80cb7b3097d0c2e03aca5aad2cb09d4cee152e17e
Fwknop Port Knocking Utility
Posted Sep 15, 2004
Authored by Michael Rash | Site cipherdyne.org

fwknop is a flexible port knocking implementation that is based around iptables. Both shared knock sequences and encrypted knock sequences are supported. In addition, fwknop makes use of passive OS fingerprinting signatures derived from p0f to ensure the OS that initiates a knock sequence conforms to a specific type. This makes it possible to allow, say, only Linux systems to connect to your SSH daemon. Both the knock sequences and OS fingerprinting are completely implemented around iptables log messages, and so a separate packet capture library is not required.

Changes: Bugfix for legacy posf code in fwknop and variable in fwknop.conf.
tags | tool, scanner
systems | linux, unix
SHA-256 | c54576718b0a6155f91409a42cc370b9033a08e217db4ff590dc671aa39d5347
Fwknop Port Knocking Utility
Posted Aug 5, 2004
Authored by Michael Rash | Site cipherdyne.org

fwknop is a flexible port knocking implementation that is based around iptables. Both shared knock sequences and encrypted knock sequences are supported. In addition, fwknop makes use of passive OS fingerprinting signatures derived from p0f to ensure the OS that initiates a knock sequence conforms to a specific type. This makes it possible to allow, say, only Linux systems to connect to your SSH daemon. Both the knock sequences and OS fingerprinting are completely implemented around iptables log messages, and so a separate packet capture library is not required.

tags | tool, scanner
systems | linux, unix
SHA-256 | 9650502e2cea77f436fb0a866d6d49819e7bc22e6d8bb0817da57228f1fb6604
Page 2 of 2
Back12Next

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    13 Files
  • 22
    Mar 22nd
    5 Files
  • 23
    Mar 23rd
    6 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close