Best State of Art IT Security Solutions
The best Innovative and powerful IT Security products

Encyclopedia / Encyclopedia Part 3 /

What is Port Knocking?

Port Knocking is a type of host-to-host correspondence in which data streams crosswise over shut ports. In this system, ports are opened remotely on a firewall by creating an association endeavor on an arrangement of prespecified shut ports. When all is said in done, information is transmitted to shut ports and got by a checking daemon which captures the data.

In one case, port thumping alludes to a system

For correspondence between two PCs (for instance named here General and  Main ) in which data is encoded, into a grouping of port numbers. This arrangement is termed the thump. At first, the principle exhibits no found ports to be open to the general population and is checking all association endeavors. The General starts association endeavors to the target site by sending a SYN parcels to the ports determined in the thump. This procedure of thumping is the thing that gives port thumping its set. The target offers no reaction to the customer amid the thumping stage, as it "quietly" forms the port grouping. At the point when the target disentangles a substantial thump it set off a server side procedure.


The definition of a valid knock varies and according to the implementation. The main-side process also varies and according to the implementation.


The fundamental motivation behind port thumping is to keep an assailant from checking a framework for conceivably exploitable administrations by doing a port output, in light of the fact that unless the aggressor sends the right thump arrangement, the ensured ports will seem shut

If for some reason or other the port knocking daemon dies, you are left with a system you cannot connect with. This is also known as a single point of failure. However, to help mitigate this problem, common port knocking setups include a process monitoring daemon that will restart the port knocking daemon if it dies.

Vulnerability Scanner - Vulnerability Management 

➤ Related pages
Anti Spam Firewall VPN
Appliance VS Software
Cloud Security
WEP Key
What is a Man in the Middle Attack?
What is a Routing Table?
What is CISSP?
What is Data Leak Prevention?
What is Dumpster Diving?
What is Grey Listing?
What is GSM Encryption?
What is Instant Messaging?
What is Port Knocking?
What is search engine hacking?
What is Spyware?
What is TCP?
What is UDP?
What is UTM?
What is Virus?
What is VoIP?
What is Whitelisting?
WiFi Pen Test
WPA Key

Powerful UTM Firewall, Vulnerability Scanner, WiFi Penetration Testing software

SecPoint is specialized to deliver the best IT security solutions and products.

Compatible with Product
Securely protected by SecPoint
Customer reference King Customer reference New York Customer reference ROC Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef Customer reference King Customer reference New York Customer reference Roc Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef