TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Portspoof: Emulate a valid service on all 65535 TCP ports

420 pointsby nateb20225 months ago

24 comments

rockskon5 months ago
*65536 ports<p>Port 0 is a port some operating systems can and do host services on accessible over the Internet.<p>Also - if there&#x27;s any MariaDB devs reading this - your default setting making the database listen on port 0 to disable Internet access does not, in fact, disable Internet access of the DB for quite a few thousand systems.
评论 #42515166 未加载
评论 #42512975 未加载
kibwen5 months ago
It feels inevitable that computer security will continue evolving towards &quot;active defense&quot; typified by approaches like the above. Look at how complex and many-layered your immune system is, and consider that eventually your computer and&#x2F;or network will resemble that as well.
评论 #42512398 未加载
评论 #42511959 未加载
评论 #42514108 未加载
评论 #42516314 未加载
评论 #42514905 未加载
sedatk5 months ago
I had made a similar attempt at stopping email crawler spambots by creating a web page that produces infinite random email addresses.<p><a href="http:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;20020610054821&#x2F;http:&#x2F;&#x2F;www.sourtimes.org&#x2F;fuckemail&#x2F;" rel="nofollow">http:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;20020610054821&#x2F;http:&#x2F;&#x2F;www.sourtim...</a>
评论 #42512955 未加载
评论 #42511087 未加载
aidenn05 months ago
Be aware that if you run something like this, you will get dozens of bug bounty requests by people who scanned your machine and found &quot;known vulnerable version of X&quot; running.
wslh5 months ago
In the mid-90s, there was a honeypot product called CyberCop Sting[1], which predated Secure Networks&#x27; Ballista[2]. CyberCop Sting could simulate TCP and UDP services across various implementations. If I recall correctly, it also allowed the configuration of TCP&#x2F;IP stacks to mimic the behavior of different operating systems. These features were particularly innovative almost 30 years ago.<p>[1] <a href="https:&#x2F;&#x2F;theswissbay.ch&#x2F;pdf&#x2F;Gentoomen%20Library&#x2F;Security&#x2F;0321108957.Addison-Wesley%20Professional.Honeypots-%20Tracking%20Hackers.pdf" rel="nofollow">https:&#x2F;&#x2F;theswissbay.ch&#x2F;pdf&#x2F;Gentoomen%20Library&#x2F;Security&#x2F;0321...</a><p>[2] <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=26440139">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=26440139</a>
评论 #42513906 未加载
veeter5 months ago
Wouldn&#x27;t that inevitably end up with your server being more closely inspected (or at least more heavily trafficked) by hackers&#x2F;bots?<p>I doubt that most script kiddies are filtering out potential honeypots&#x2F;things like this from their tools.
评论 #42511306 未加载
评论 #42511223 未加载
评论 #42511209 未加载
评论 #42512399 未加载
评论 #42516178 未加载
评论 #42513549 未加载
varun_ch5 months ago
I do something similar on my website: <a href="https:&#x2F;&#x2F;bini.wales" rel="nofollow">https:&#x2F;&#x2F;bini.wales</a> returns 200 for all endpoints and logs all attempts, so it makes for a decent have a honeypot against automated attacks (mostly it just catches people mass scanning for vulnerable WordPress plugins or leftover backdoors). Similarly, <a href="https:&#x2F;&#x2F;varun.ch&#x2F;login" rel="nofollow">https:&#x2F;&#x2F;varun.ch&#x2F;login</a> emulates a WordPress site (with a twist)
评论 #42514440 未加载
AbraKdabra5 months ago
Nice, I&#x27;m glad the word &quot;honeypot&quot; is never used, once I inherited a &quot;true&quot; honeypot and when I went to check it, it had like 30 ports opened, my reaction was literally &quot;what the fuck is this crap&quot; said out loud.
评论 #42511207 未加载
评论 #42511237 未加载
yonatan80705 months ago
&gt; it binds to just ONE tcp port per a running instance !<p>How does that work? Do you need to run 65535 instances to cover all ports?
评论 #42512602 未加载
评论 #42511296 未加载
评论 #42511265 未加载
评论 #42515993 未加载
PaulAJ5 months ago
Would this also be potentially a DoS amplifier? If you sent it the right spoof packets, would it return a lot of packets to the apparent origin?
评论 #42511849 未加载
评论 #42513435 未加载
评论 #42511503 未加载
halayli5 months ago
or not respond at all. On linux you can disable the rst behavior using<p><pre><code> sysctl -w net.ipv4.tcp_reset_reject=0</code></pre>
评论 #42519128 未加载
amyfp2145 months ago
the natural evolution of such an approach is to also seemingly advertise a variety of security holes.. and maintain a blacklist silently that feeds actual production systems as a firewall, should said hacker reach that point
westurner5 months ago
How does this compare to a tarpit?<p>Tarpit (networking) <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Tarpit_(networking)" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Tarpit_(networking)</a><p>&#x2F;? inurl:awesome tarpit <a href="https:&#x2F;&#x2F;www.google.com&#x2F;search?q=inurl%3Aawesome+tarpit+site%3Agithub.com" rel="nofollow">https:&#x2F;&#x2F;www.google.com&#x2F;search?q=inurl%3Aawesome+tarpit+site%...</a><p>&quot;Does &quot;TARPIT&quot; have any known vulnerabilities or downsides?&quot; <a href="https:&#x2F;&#x2F;serverfault.com&#x2F;questions&#x2F;611063&#x2F;does-tarpit-have-any-known-vulnerabilities-or-downsides" rel="nofollow">https:&#x2F;&#x2F;serverfault.com&#x2F;questions&#x2F;611063&#x2F;does-tarpit-have-an...</a><p><a href="https:&#x2F;&#x2F;gist.github.com&#x2F;flaviovs&#x2F;103a0dbf62c67ff371ff75fc62fdded3" rel="nofollow">https:&#x2F;&#x2F;gist.github.com&#x2F;flaviovs&#x2F;103a0dbf62c67ff371ff75fc62f...</a> :<p>&gt; <i>However, if implemented incorrectly, TARPIT can also lead to resource exhaustion in your own server, specifically with the conntrack module. That&#x27;s because conntrack is used by the kernel to keep track of network connections, and excessive use of conntrack entries can lead to system performance issues,</i> [...]<p>&gt; <i>The script below uses packet marks to flag packets candidate for TARPITing. Together with the NOTRACK chain, this avoids the conntrack issue while keeping the TARPIT mechanism working.</i><p>The tarpit module used to be in tree.<p><i>xtables-addons&#x2F;</i> xt_TARPIT.c: <a href="https:&#x2F;&#x2F;github.com&#x2F;tinti&#x2F;xtables-addons&#x2F;blob&#x2F;master&#x2F;extensions&#x2F;xt_TARPIT.c">https:&#x2F;&#x2F;github.com&#x2F;tinti&#x2F;xtables-addons&#x2F;blob&#x2F;master&#x2F;extensio...</a>
评论 #42511574 未加载
snvzz5 months ago
Cute as this is, most attackers aren&#x27;t obsessed with you, but are looking at just one port, the one they have an exploit for.<p>And if you have that port open with a vulnerable service, they&#x27;ll find and exploit it, irrespective of whether this tool is running.
评论 #42512252 未加载
ajsnigrutin5 months ago
&gt; it takes more than 8hours and 200MB of sent data in order to properly go through the reconessaince phase for your system ( nmap -sV -p - equivalent).<p>So, every automated portscan from a hacked machne will waste 200MB of my bandwidth?
评论 #42521929 未加载
debarshri5 months ago
What would be great is if there is a network call detected on port where there is no actual service listen, if the tool could create alerts and send it to SIEM it will create lot of value.
评论 #42518973 未加载
ENOTTY5 months ago
To speed up a comprehensive port probe with service discovery, one could use a few different systems on different IPs and divide the work.
TZubiri5 months ago
Or just don&#x27;t
pmarreck5 months ago
Well, that is certainly one way to attack the problem!
justmarc5 months ago
Bringing back fond memories of the happy 90s
stormbeard5 months ago
How is this better than configuring an iptables redirection?
评论 #42512637 未加载
PeterWhittaker5 months ago
Interesting concept, am curious how this withstands community review and analysis.<p>Bit puzzled though, by the statement made immediately after stating that it is GPL2: <i>For commercial, legitimate applications, please contact the author for the appropriate licensing arrangements</i>.<p>Since the GPL2 doesn&#x27;t permit restricting what others do with GPLd software, I don&#x27;t think this statement is doing what the author hopes; they might want to consult a lawyer.<p>(IANAL, etc., but there is nothing in there to prevent me, e.g., from building a business out of this, charging gazillions, and keeping it all for myself, provided I make the source available to my customers.)
评论 #42511071 未加载
评论 #42511174 未加载
评论 #42511050 未加载
评论 #42511153 未加载
评论 #42513363 未加载
locusofself5 months ago
Could this not trivially be accomplished with a service listening on one port and &#x27;iptables&#x27; rules?
评论 #42511714 未加载
phoronixrly5 months ago
&gt; By using those two techniques together:<p>&gt; your attackers will have a tough time while trying to identify your real services.<p>So... Security through obscurity?<p>&gt; the only way to determine if a service is emulated is through a protocol probe (imagine probing protocols for 65k open ports!).<p>So... Security through obscurity?<p>&gt; it takes more than 8hours and 200MB of sent data in order to properly go through the reconessaince phase for your system ( nmap -sV -p - equivalent).<p>So... Security through obscurity?<p>Idk... Maybe I am not versed enough in infosec but this also begs the question are you not attracting more interest if your system lights up green for an exposed Redis instance for an adversary to notice you and take a closer look for anything else vulnerable.
评论 #42512277 未加载
评论 #42511884 未加载
评论 #42512865 未加载
评论 #42511860 未加载
评论 #42511834 未加载
评论 #42511890 未加载
评论 #42512445 未加载