mirror of
https://github.com/drk1wi/portspoof.git
synced 2024-07-03 00:34:09 +00:00
![Piotr Duszynski](/assets/img/avatar_default.png)
1.0 - 01/08/2013 - Linux * Major release. * Ported to C++. * Example NMAP domino-enum-password NSE, McAffe UTF7 XSS, etc. exploits added . * Fuzzer functionality added. * Many minor improvements and enhancements have been made.
36 lines
1.4 KiB
Markdown
Executable File
36 lines
1.4 KiB
Markdown
Executable File
#Portspoof [![Build Status](https://secure.travis-ci.org/drk1wi/portspoof.png)](https://secure.travis-ci.org/drk1wi/portspoof.png)
|
|
|
|
## Effective defense against port scanners
|
|
|
|
### Short description:
|
|
|
|
The portspoof program is designed to enhance OS security through emulation of legitimate service signatures on otherwise closed ports.
|
|
It is meant to be a lightweight, fast, portable and secure addition to the any firewall system or security infrastructure.
|
|
The general goal of the program is to make the port scanning software (Nmap/Unicornscan/etc) process slow and output very difficult to interpret, thus making the attack reconnaissance phase a challenging and bothersome task.
|
|
|
|
###General benefits of using this software are:
|
|
* Protection against well known port scanners (all scanning results are chaotic and difficult to interpret)
|
|
* Possibility to use your current firewall rules to decide for which hosts "port spoofing" applies
|
|
* Port scanning detection functionality
|
|
* Lightweight and fast
|
|
|
|
|
|
###Author: Piotr Duszynski (piotr@duszynski.eu)
|
|
Follow me at @drk1wi
|
|
|
|
###License
|
|
Consult the COPYING file.
|
|
|
|
###Compile instructions
|
|
Consult the INSTALL file.
|
|
|
|
###Other important files
|
|
|
|
* AUTHORS - File with Author contact info
|
|
* Changelog - What I have implemented
|
|
* TODO - What I am planning to implement in the upcoming versions
|
|
* FAQ - Bug reporting and frequently asked questions
|
|
|
|
|
|
|