Welcome to the php ebenezer's messageboard
see bottom for more info

HOME


Re: Re: Web 3.0 portknocking (14/01/22 00:03:37)
    Well if you go and read FX implementation it goes 20 years back
    https://packetstormsecurity.com/files/22121/cd00r.c.html

    I did play around with portknocking around that time, it was a nifty concept but limited to computer enthusiasts circles. But never met anyone, or know of usecases that it was used in a enterprise setting..

    Well NSA certainly saw the value as they used it in their toolset CTRL+F "dewdrop"
    https://en.m.wikipedia.org/wiki/The_Shadow_Brokers

    Actually there is a recent blog regarding reversing engineering dewdrop:

    "
    You can definitely see that architecture and code are carefully thought and engineered. They have been doing this for a long time and definitely have more resources than most (nation state) attackers. This isn’t some random proof of concept code. Almost every operating system is a target so their catalog is impressive. The problems of SIGINT and wanting to collect all the things.
    "
    RF
rf


back to main board expand thread
Name email
Subject
Enter your message here :
Ask for confirmation if modified Are you not a spammer?
   
Show allowed tags
 
Show me the last post since :
local time shift :

come again

messageboard's PHP script is a courtesy of Laurent

 This board has been visited 195301 timesCurrent time is 24/05/22 21:21:42
Re: Re: Web 3.0 portknocking