This repository has been archived on 2024-11-13. You can view files and clone it, but cannot push or open issues or pull requests.
fediversity_website/content/evenementen/nluug/voorjaarsconferentie-2018/talks/adrianus-warmenhoven-port-knocking.md

36 lines
1.9 KiB
Markdown
Raw Normal View History

---
categories:
- presentaties
date: 2018-11-15T10:31:43+02:00
description: ""
layout: event-talk
tags:
- hacking
- port-knocking
- single-packet-authentication
title: "Adrianus Warmenhoven - Port Knocking"
speakers:
- adrianus-warmenhoven
presentation:
filename: 2018-11-15-adrianus-warmenhoven-port-knocking.pdf
recording:
platform: youtube
url:
---
## Abstract
Using SPA for profit and fun, or, a zero-cost solution to getting your fridge out of Shodan.
Port knocking has been around for quite a while; send a sequence of packets to seemingly closed ports and Sesame opens up. This is, however, not so very secure. Single Packet Authentication port knocking, involving a signed packet with an timestamp, is a lot more secure and works quite well.
I want to make the case that, just like firewalling (IPTables), SPA port knocking should be a default mechanism in any modern OS, especially the IoT OSes. It is easily implemented (both on server and on client side) and is readily available. It takes the stress out of getting every underpaid worker on the same security page whilst still enabling access when needed.
And finally, it can be used (a hobby of mine) to waste tremendous amounts of time and resources of (wannabe) attackers; your server can be a Decepticon too!
## Biography
Adrianus Warmenhoven has been involved in pioneering endeavors in IT since the early 1990s. Collaborated in setting up firsts in Dutch anti-cybercrime, branch organization for ISPs as well as being CTO for one of the first free ISPs in the Netherlands, co-designer of supercomputing hardware and running projects for Dutch governmental organizations.
For various international companies, he has done security reviews and given advice on how to deal with active threats and extortion. He is now affiliated with RedSocks as security evangelist and develops academic classes in hacking.