Warning This git repository was meant to be a small (and fun) demonstration of what can be done with eBPF. It was clearly over-engineered as it was not developped nor optimized for any kind of use.
Knockles, is a port knocking tool based on eBPF 🐝. It allows to remotely open a TCP connection while being completely invisible to port scanners.
- A single SYN request is sent on an opened || closed port 📨 📫
- It carries an OTP for authentication so you can be the only one to open a port 🔐
- Once authentified, a random (HMAC based) port is opened for a TCP connection 🎲
- Then, the port is closed as soon as a connection has been established 🚪
Modify the following macros/variables
./knockles/src/knockles.bpf.c
PORT
: Port monitored for knocks [default:80
]
./knockles/src/knockles.c
HMAC_DURATION
: Time range between two different OTP (in seconds) [default:30
]LISTENING_DURATION
: Timeout of the opened port if no connection occurs (in seconds) [default:30
]SECRET
: HMAC secret key [default:MY_SECRET_KEY
]
sudo apt install git make pkg-config libelf-dev clang-11 libc6-dev-i386 bpftool libssl-dev -y
pip install scapy
sudo apt install git make pkg-config libelf-dev clang-11 libc6-dev-i386 linux-tools-common linux-tools-$(uname -r) libssl-dev -y
pip install scapy
cd ./knockles/src
make
Usage: ./knockles [OPTION]...
eBPF port knocking tool - Server.
--help display this help and exit
--daemon run program as daemon
usage: knuckknock.py [-h] -s KEY -t TIME -d IP -p PORT
eBPF port knocking tool - Client.
optional arguments:
-h, --help show this help message and exit
-s KEY , --secret KEY
HMAC secret key
-t TIME, --time TIME generated HMAC duration
-d IP, --dst IP destination IP address
-p PORT, --port PORT monitored port