How make a port appear open with an nmap scan
To avoid someone knowing which port are open on my machine, I thought it would useful to open all unused port so that the nmaper is unable to identify which port are really open.
How make a port appear open with an nmap
scan
networking netcat nmap port
add a comment |
To avoid someone knowing which port are open on my machine, I thought it would useful to open all unused port so that the nmaper is unable to identify which port are really open.
How make a port appear open with an nmap
scan
networking netcat nmap port
Something needs to open/listen to the port ; unix.stackexchange.com/a/270647/117549 is an example, but you seem instead to be asking how you could have something listening to ~65,000 ports, correct?
– Jeff Schaller
Dec 31 '18 at 11:54
Related question: unix.stackexchange.com/questions/399626/…
– Rui F Ribeiro
Dec 31 '18 at 12:08
add a comment |
To avoid someone knowing which port are open on my machine, I thought it would useful to open all unused port so that the nmaper is unable to identify which port are really open.
How make a port appear open with an nmap
scan
networking netcat nmap port
To avoid someone knowing which port are open on my machine, I thought it would useful to open all unused port so that the nmaper is unable to identify which port are really open.
How make a port appear open with an nmap
scan
networking netcat nmap port
networking netcat nmap port
edited Jan 5 at 13:18
user123456
asked Dec 31 '18 at 9:52
user123456user123456
1,49921535
1,49921535
Something needs to open/listen to the port ; unix.stackexchange.com/a/270647/117549 is an example, but you seem instead to be asking how you could have something listening to ~65,000 ports, correct?
– Jeff Schaller
Dec 31 '18 at 11:54
Related question: unix.stackexchange.com/questions/399626/…
– Rui F Ribeiro
Dec 31 '18 at 12:08
add a comment |
Something needs to open/listen to the port ; unix.stackexchange.com/a/270647/117549 is an example, but you seem instead to be asking how you could have something listening to ~65,000 ports, correct?
– Jeff Schaller
Dec 31 '18 at 11:54
Related question: unix.stackexchange.com/questions/399626/…
– Rui F Ribeiro
Dec 31 '18 at 12:08
Something needs to open/listen to the port ; unix.stackexchange.com/a/270647/117549 is an example, but you seem instead to be asking how you could have something listening to ~65,000 ports, correct?
– Jeff Schaller
Dec 31 '18 at 11:54
Something needs to open/listen to the port ; unix.stackexchange.com/a/270647/117549 is an example, but you seem instead to be asking how you could have something listening to ~65,000 ports, correct?
– Jeff Schaller
Dec 31 '18 at 11:54
Related question: unix.stackexchange.com/questions/399626/…
– Rui F Ribeiro
Dec 31 '18 at 12:08
Related question: unix.stackexchange.com/questions/399626/…
– Rui F Ribeiro
Dec 31 '18 at 12:08
add a comment |
2 Answers
2
active
oldest
votes
You have got labrea for people scanning your network IP addresses, have not tested it for a good while now.
labrea - Honeypot for incoming IP connection attempts
labrea creates virtual machines for unused IP addresses in the
specified block of IP addresses. LaBrea sits and listens for ARP
"who-has" requests.
When an ARP request for a particular IP goes unanswered for longer
than its "rate" setting (default: 3 seconds), labrea crafts an ARP
reply that routes all traffic destined for the IP to a "bogus" MAC
address. labrea sniffs for TCP/IP traffic sent to that MAC address and
then responds to any SYN packet with a SYN/ACK packet that it creates.
To install it in Debian, do:
sudo apt-get install labrea
As for answering in some designated common ports, and providing alerts, you have got psad, though as far as I remembered it was not about listening all ports.
You can always run honeypots, though I have not tested them for a good while.
Nevertheless, and entering the realm of my opinion, I prefer to drop all connections to unused ports, the less services that are exposed to the outside, the less avenues for attacks.
Off topic, further references: "TCP/IP Illustrated, vol I - the protocols", 2nd edition, Stevens et al;
– Rui F Ribeiro
Dec 31 '18 at 12:14
add a comment |
On Linux, you can use iptables
's socket
match to have iptables
know if a TCP
port is in use. Combined with the xtables-addons's TARPIT
target (also using LaBrea's concepts) this can make look open any unused TCP
port automatically, while leaving actual open ports working as usual. For UDP
there's probably not much difference between an open port not answering and a dropped port so I'm not talking about it anymore (just drop udp by default).
Rules:
iptables -N openclosed
iptables -A openclosed -p tcp -m socket --nowildcard -j RETURN
iptables -A openclosed -p tcp -j TARPIT --honeypot
iptables -I INPUT -j openclosed
Caveats: every connection makes a conntrack entry used by netfilter. This solution can thus make a lot of conntrack ressources become used. Bear this in mind when the system is receiving an attack rather than a scan. While TARPIT
can be used without netfilter (using NOTRACK
), I'm not sure socket
can, and anyway this can't be kept as simple as above. Adding the --honeypot
option to TARPIT
makes it cheaper for the scan if not sending data, but also for netfilter; feel free to remove it. Also --nowildcard
might or might not be suitable for router usage (but it's ok anyway for a local usage in the INPUT
chain).
add a comment |
Your Answer
StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "106"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});
function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: false,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: null,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});
}
});
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f491729%2fhow-make-a-port-appear-open-with-an-nmap-scan%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
2 Answers
2
active
oldest
votes
2 Answers
2
active
oldest
votes
active
oldest
votes
active
oldest
votes
You have got labrea for people scanning your network IP addresses, have not tested it for a good while now.
labrea - Honeypot for incoming IP connection attempts
labrea creates virtual machines for unused IP addresses in the
specified block of IP addresses. LaBrea sits and listens for ARP
"who-has" requests.
When an ARP request for a particular IP goes unanswered for longer
than its "rate" setting (default: 3 seconds), labrea crafts an ARP
reply that routes all traffic destined for the IP to a "bogus" MAC
address. labrea sniffs for TCP/IP traffic sent to that MAC address and
then responds to any SYN packet with a SYN/ACK packet that it creates.
To install it in Debian, do:
sudo apt-get install labrea
As for answering in some designated common ports, and providing alerts, you have got psad, though as far as I remembered it was not about listening all ports.
You can always run honeypots, though I have not tested them for a good while.
Nevertheless, and entering the realm of my opinion, I prefer to drop all connections to unused ports, the less services that are exposed to the outside, the less avenues for attacks.
Off topic, further references: "TCP/IP Illustrated, vol I - the protocols", 2nd edition, Stevens et al;
– Rui F Ribeiro
Dec 31 '18 at 12:14
add a comment |
You have got labrea for people scanning your network IP addresses, have not tested it for a good while now.
labrea - Honeypot for incoming IP connection attempts
labrea creates virtual machines for unused IP addresses in the
specified block of IP addresses. LaBrea sits and listens for ARP
"who-has" requests.
When an ARP request for a particular IP goes unanswered for longer
than its "rate" setting (default: 3 seconds), labrea crafts an ARP
reply that routes all traffic destined for the IP to a "bogus" MAC
address. labrea sniffs for TCP/IP traffic sent to that MAC address and
then responds to any SYN packet with a SYN/ACK packet that it creates.
To install it in Debian, do:
sudo apt-get install labrea
As for answering in some designated common ports, and providing alerts, you have got psad, though as far as I remembered it was not about listening all ports.
You can always run honeypots, though I have not tested them for a good while.
Nevertheless, and entering the realm of my opinion, I prefer to drop all connections to unused ports, the less services that are exposed to the outside, the less avenues for attacks.
Off topic, further references: "TCP/IP Illustrated, vol I - the protocols", 2nd edition, Stevens et al;
– Rui F Ribeiro
Dec 31 '18 at 12:14
add a comment |
You have got labrea for people scanning your network IP addresses, have not tested it for a good while now.
labrea - Honeypot for incoming IP connection attempts
labrea creates virtual machines for unused IP addresses in the
specified block of IP addresses. LaBrea sits and listens for ARP
"who-has" requests.
When an ARP request for a particular IP goes unanswered for longer
than its "rate" setting (default: 3 seconds), labrea crafts an ARP
reply that routes all traffic destined for the IP to a "bogus" MAC
address. labrea sniffs for TCP/IP traffic sent to that MAC address and
then responds to any SYN packet with a SYN/ACK packet that it creates.
To install it in Debian, do:
sudo apt-get install labrea
As for answering in some designated common ports, and providing alerts, you have got psad, though as far as I remembered it was not about listening all ports.
You can always run honeypots, though I have not tested them for a good while.
Nevertheless, and entering the realm of my opinion, I prefer to drop all connections to unused ports, the less services that are exposed to the outside, the less avenues for attacks.
You have got labrea for people scanning your network IP addresses, have not tested it for a good while now.
labrea - Honeypot for incoming IP connection attempts
labrea creates virtual machines for unused IP addresses in the
specified block of IP addresses. LaBrea sits and listens for ARP
"who-has" requests.
When an ARP request for a particular IP goes unanswered for longer
than its "rate" setting (default: 3 seconds), labrea crafts an ARP
reply that routes all traffic destined for the IP to a "bogus" MAC
address. labrea sniffs for TCP/IP traffic sent to that MAC address and
then responds to any SYN packet with a SYN/ACK packet that it creates.
To install it in Debian, do:
sudo apt-get install labrea
As for answering in some designated common ports, and providing alerts, you have got psad, though as far as I remembered it was not about listening all ports.
You can always run honeypots, though I have not tested them for a good while.
Nevertheless, and entering the realm of my opinion, I prefer to drop all connections to unused ports, the less services that are exposed to the outside, the less avenues for attacks.
edited Dec 31 '18 at 13:54
answered Dec 31 '18 at 12:00
Rui F RibeiroRui F Ribeiro
39.4k1479131
39.4k1479131
Off topic, further references: "TCP/IP Illustrated, vol I - the protocols", 2nd edition, Stevens et al;
– Rui F Ribeiro
Dec 31 '18 at 12:14
add a comment |
Off topic, further references: "TCP/IP Illustrated, vol I - the protocols", 2nd edition, Stevens et al;
– Rui F Ribeiro
Dec 31 '18 at 12:14
Off topic, further references: "TCP/IP Illustrated, vol I - the protocols", 2nd edition, Stevens et al;
– Rui F Ribeiro
Dec 31 '18 at 12:14
Off topic, further references: "TCP/IP Illustrated, vol I - the protocols", 2nd edition, Stevens et al;
– Rui F Ribeiro
Dec 31 '18 at 12:14
add a comment |
On Linux, you can use iptables
's socket
match to have iptables
know if a TCP
port is in use. Combined with the xtables-addons's TARPIT
target (also using LaBrea's concepts) this can make look open any unused TCP
port automatically, while leaving actual open ports working as usual. For UDP
there's probably not much difference between an open port not answering and a dropped port so I'm not talking about it anymore (just drop udp by default).
Rules:
iptables -N openclosed
iptables -A openclosed -p tcp -m socket --nowildcard -j RETURN
iptables -A openclosed -p tcp -j TARPIT --honeypot
iptables -I INPUT -j openclosed
Caveats: every connection makes a conntrack entry used by netfilter. This solution can thus make a lot of conntrack ressources become used. Bear this in mind when the system is receiving an attack rather than a scan. While TARPIT
can be used without netfilter (using NOTRACK
), I'm not sure socket
can, and anyway this can't be kept as simple as above. Adding the --honeypot
option to TARPIT
makes it cheaper for the scan if not sending data, but also for netfilter; feel free to remove it. Also --nowildcard
might or might not be suitable for router usage (but it's ok anyway for a local usage in the INPUT
chain).
add a comment |
On Linux, you can use iptables
's socket
match to have iptables
know if a TCP
port is in use. Combined with the xtables-addons's TARPIT
target (also using LaBrea's concepts) this can make look open any unused TCP
port automatically, while leaving actual open ports working as usual. For UDP
there's probably not much difference between an open port not answering and a dropped port so I'm not talking about it anymore (just drop udp by default).
Rules:
iptables -N openclosed
iptables -A openclosed -p tcp -m socket --nowildcard -j RETURN
iptables -A openclosed -p tcp -j TARPIT --honeypot
iptables -I INPUT -j openclosed
Caveats: every connection makes a conntrack entry used by netfilter. This solution can thus make a lot of conntrack ressources become used. Bear this in mind when the system is receiving an attack rather than a scan. While TARPIT
can be used without netfilter (using NOTRACK
), I'm not sure socket
can, and anyway this can't be kept as simple as above. Adding the --honeypot
option to TARPIT
makes it cheaper for the scan if not sending data, but also for netfilter; feel free to remove it. Also --nowildcard
might or might not be suitable for router usage (but it's ok anyway for a local usage in the INPUT
chain).
add a comment |
On Linux, you can use iptables
's socket
match to have iptables
know if a TCP
port is in use. Combined with the xtables-addons's TARPIT
target (also using LaBrea's concepts) this can make look open any unused TCP
port automatically, while leaving actual open ports working as usual. For UDP
there's probably not much difference between an open port not answering and a dropped port so I'm not talking about it anymore (just drop udp by default).
Rules:
iptables -N openclosed
iptables -A openclosed -p tcp -m socket --nowildcard -j RETURN
iptables -A openclosed -p tcp -j TARPIT --honeypot
iptables -I INPUT -j openclosed
Caveats: every connection makes a conntrack entry used by netfilter. This solution can thus make a lot of conntrack ressources become used. Bear this in mind when the system is receiving an attack rather than a scan. While TARPIT
can be used without netfilter (using NOTRACK
), I'm not sure socket
can, and anyway this can't be kept as simple as above. Adding the --honeypot
option to TARPIT
makes it cheaper for the scan if not sending data, but also for netfilter; feel free to remove it. Also --nowildcard
might or might not be suitable for router usage (but it's ok anyway for a local usage in the INPUT
chain).
On Linux, you can use iptables
's socket
match to have iptables
know if a TCP
port is in use. Combined with the xtables-addons's TARPIT
target (also using LaBrea's concepts) this can make look open any unused TCP
port automatically, while leaving actual open ports working as usual. For UDP
there's probably not much difference between an open port not answering and a dropped port so I'm not talking about it anymore (just drop udp by default).
Rules:
iptables -N openclosed
iptables -A openclosed -p tcp -m socket --nowildcard -j RETURN
iptables -A openclosed -p tcp -j TARPIT --honeypot
iptables -I INPUT -j openclosed
Caveats: every connection makes a conntrack entry used by netfilter. This solution can thus make a lot of conntrack ressources become used. Bear this in mind when the system is receiving an attack rather than a scan. While TARPIT
can be used without netfilter (using NOTRACK
), I'm not sure socket
can, and anyway this can't be kept as simple as above. Adding the --honeypot
option to TARPIT
makes it cheaper for the scan if not sending data, but also for netfilter; feel free to remove it. Also --nowildcard
might or might not be suitable for router usage (but it's ok anyway for a local usage in the INPUT
chain).
answered Jan 3 at 20:18
A.BA.B
4,0921724
4,0921724
add a comment |
add a comment |
Thanks for contributing an answer to Unix & Linux Stack Exchange!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f491729%2fhow-make-a-port-appear-open-with-an-nmap-scan%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Something needs to open/listen to the port ; unix.stackexchange.com/a/270647/117549 is an example, but you seem instead to be asking how you could have something listening to ~65,000 ports, correct?
– Jeff Schaller
Dec 31 '18 at 11:54
Related question: unix.stackexchange.com/questions/399626/…
– Rui F Ribeiro
Dec 31 '18 at 12:08