Port Knocking Tool

Port knocking is a procedure to secure the server or server services in networks to protect against unauthorized access. The ports used for communication are initially blocked by the server's firewall. A port knocking daemon monitors incoming SYN packets on the server, which, in the correct order, causes the daemon to make the corresponding blocked port accessible again. As soon as the server service is no longer required, the desired port can be blocked again by sending another sequence of SYN packets.
Port Knocking Tool is a Windows client with graphical user interface (GUI) to send the appropriate order of the SYN packets to the protected server. Both UDP and TCP packets are supported. The installation of Npcap is required for TCP. A console application is also included.
Information
System requirements
- Windows 7 SP1, 8 or 10
- .NET Framework 4.7.2
- optional: Nmap Project Paket Bibliothek (Npcap)
Licence
Port Knocking Tool can be downloaded free of charge and used for both private and business purposes.
The software is available under the MIT licence.
Privacy policy
Port Knocking Tool neither creates telemetry data, nor other data is collected and sent to Epinox.de or third parties.
Manual
General
Send: | The packet sequence selected in the list is sent to the protected server |
Add: | A new packet sequence is added to the list |
Modify: | Make changes to the sequence |
Copy: | Copy the selected sequence |
Remove: | The sequence is removed from the list |
Advanced
Delay: | Enter the delay time in milliseconds between two IP packets |
Use Pcap: | To be able to send TCP packets as well, this option must be activated. An installation of Npcap is required |
Encrypt file: | The settings file is encrypted |
Inactivity lock time: | Lock user interface after the specified time (in seconds) |
Sequence form
Name: | Description that appears in the list |
Host: | Server address |
Sequence: | Enter the desired sequence Format: port[:udp or :tcp][, ...] Example: 7000:udp,8000:udp,9000:udp |
Send mode: | Override global setting "Use Pcap": Default or PCap |
Host / Port (Check): | Host port to be checked |
Delay (Check): | Delays checking the port in milliseconds after sending the sequence |
Program: | Program that is started after the sequence has been sent |
Arguments: | Program parameters |
Delay: | Delays program start in milliseconds after sending the sequence |
Start after check: | Starts the program only if the port to be checked is open |
PortKnockingTool.cfg
Portable | yes|no |
ConfigFile | Path to the settings file (PortKnockingTool.xml|.epk) |
History
Version 1.3.1 [2023-01-29]
- New: Checking the connection after sending the sequence
Version 1.3 [2023-01-23]
- New: Settings file encryption
- New: Inactivity lock
- Real portable version
- Adjustments to the user interface
- Some internal adjustments and corrections
- External libraries updated
Version 1.2 [2020-05-15]
- Feature: console application added
- Bugfix: fixed issue when nothing was entered in the sequence form in program delay
- Design: sequence list is now sorted
Version 1.1 [2020-04-30]
- Feature: run external program after sending sequence
- Bugfix: value of delay beween packets is now used
- Update: PacketDotNet was updated to 1.0.5
Version 1.0 [2020-03-25]
- first release
Archive
Older versions
Download