Port Knocking & Binary Exploitation | Cyberry Vulnhub CTF Walkthrough
We covered the first part solution walkthrough of Cyberry Vulnhub lab where we demonstrated port knocking.
We covered the first part solution walkthrough of Cyberry Vulnhub lab where we demonstrated port knocking.
In the second part, we covered the second solution walkthrough of Cyberry Vulnhub lab where we demonstrated binary exploitation with GDB debugger & Metasploit framework.
Port Knocking
Network administrators employ a technique called port knocking for authentication. It comprises of a knock sequence, which is a predetermined series of closed port connection attempts to particular IP addresses. The method makes use of a daemon that scans firewall log files for the proper order of connection requests.
Because the protected ports will appear closed unless the attacker transmits the correct knock sequence, the main goal of port knocking is to prevent an attacker from using a port scan to look for potentially vulnerable services on a system.
Binary Exploitation
Computer executables, often known as binaries, are files containing machine code. The binaries you will encounter in CTFs are primarily Linux ELF files, however occasionally you will come across Windows executables. Within the field of cyber security, binary exploitation is a vast issue that essentially involves identifying a software vulnerability and using it to take control of a shell or change the way the program operates.