Portforge

Lightweight utility to fool port scanners

Portforge

This script is intended to open as many sockets as you wish (between 1024 - 65535).
Lower than 1024 works too but you have to be a root user for that.

This can be useful when you don't want people to map out your device
to see what you're running and what not, so it's a small step to defeat reconnaissance.

Technology from the core

Portforge.cr uses a technique built-in the Crystal compiler called Fibers.
They are very much like system threads but Fibers is a lot more lightweight
& the execution is managed through the process 1.

The larger range you pick, the longer it takes for the script to
load up every socket but I've tried my best to optimize the script
so it should just take a couple of minutes (depending on the system of course).

Under the hood

The script works in 2 steps.
It first performs its own scan on the system to see which port is already open.
The open ports is then put on one list and the closed ports is put on another list.
The next step is opening the closed ports, so the script picks the list with all the closed
ports and opens a socket on every one of them.

While the main fiber is opening a socket on every port,
another fiber is called under the main one which listens for incoming connections and closes it directly.
This process is repeated indefinitely, or until you interrupt the script.

Getting started (you only need to do this once)

crystal build portforge.cr

Requirement

Usage

./portforge IP startport endport

Demo

The first picture is portforge.cr running and the second one is the result from an Nmap scan.
As you can see, Nmap thinks I'm running all these services when in reality, it is just portforge.cr running.

Repository

Portforge

Owner
Statistic
  • 33
  • 5
  • 0
  • 0
  • 0
  • over 4 years ago
  • July 28, 2018
License

The Unlicense

Links
Synced at

Thu, 07 Nov 2024 18:26:06 GMT

Languages