Currently viewing ATT&CK v8.2 which was live between October 27, 2020 and April 28, 2021. Learn more about the versioning system or see the live site.

Traffic Signaling: Port Knocking

Adversaries may use port knocking to hide open ports used for persistence or command and control. To enable a port, an adversary sends a series of attempted connections to a predefined sequence of closed ports. After the sequence is completed, opening a port is often accomplished by the host based firewall, but could also be implemented by custom software.

This technique has been observed to both for the dynamic opening of a listening port as well as the initiating of a connection to a listening server on a different system.

The observation of the signal packets to trigger the communication can be conducted through different methods. One means, originally implemented by Cd00r [1], is to use the libpcap libraries to sniff for the packets in question. Another method leverages raw sockets, which enables the malware to use ports that are already open for use by other programs.

ID: T1205.001
Sub-technique of:  T1205
Tactics: Defense Evasion, Persistence, Command And Control
Platforms: Linux, Network, Windows, macOS
Permissions Required: User
Data Sources: Netflow/Enclave netflow, Packet capture
Version: 1.1
Created: 01 July 2020
Last Modified: 21 October 2020

Procedure Examples

Name Description
PROMETHIUM

PROMETHIUM has used a script that configures the knockd service and firewall to only accept C2 connections from systems that use a specified sequence of knock ports.[2]

Mitigations

Mitigation Description
Filter Network Traffic

Mitigation of some variants of this technique could be achieved through the use of stateful firewalls, depending upon how it is implemented.

Detection

Record network packets sent to and from the system, looking for extraneous packets that do not belong to established flows.

References