Lord Of The Root: 1.0.1
How about taking a look on Port Knocking? Let’s see how we can knock ports in this CTF !! Lab Environment Attacker’s Machine : Linux kali 4.18.0-kali2-amd64 #1 SMP Debian 4.18.10-2kali1 (2018-10-09) x86_64 GNU/Linux Vulnerable Machine : Lord Of The Root: 1.0.1 Now let’s scan our local network to which attacking machine and the vulnerable machine is connected. Syntax used: arp-scan --local Victim machine: 192.168.59.135 Performing the enumeration of ports and services using nmap. Syntax Used: nmap -A 192.168.59.135 -Pn Results: Port 22 is open and ssh service is active. Tried connecting to ssh and got some hint to knock ports 1,2,3 Syntax Used: ssh 192.168.59.135 Now performing port scanning again as given in the hint. Syntax Used: nmap -r -p1,2,3 -A 192.168.59.135 -Pn Now, again performing the nmap scan to see if something happened or if we can get the new results. Syntax Used: nmap -p- -A 192.168.59.135 -Pn Re