WayCup
These scripts let you expose your real server functionality only after sending the magic “Wake Up” packet to an open port.
You can use WayCup as an additional layer of security against fingerprinting for your SSH/HTTP servers (and many more), or a minimal alternative to port knocking.
Use Cases:
- Hide services from security scanners (Shodan, Censys, nmap, zmap) and hackers (port scanning and fingerprint fails).
- Keep your server a secret while it listens to www facing ports. It’s like a black hole.
- Expose a service’s functionality on a port only to clients with a pre-shared secret, without modifying the application layer or managing users.
- Copy/Paste where you don’t want to configure a proxy like nginx. Also, it’s easy to fingerprint nginx. This is a copy/paste solution with almost no dependencies.
- Honeypots – Log all the transport to a file with a tcpdump/alternative.
Less secure (but nice) use cases:
- Use as an API for remote calls on a machine (run a generic script)
- When SSH is not (or can’t be) installed – pure reverse bash shell.
- Pentesting and Red Teams.
How it works:
It wraps your application with a “black hole” that swallows automatic crawlers and bots, thus leaving your assets “anonymous” and making cyber attacks on your assets more complex.
- The server(s) listen on any port for a magic packet via TCP/UDP.
- A magic “Wake Up” packet is sent from a client.
- The “Wake Up” packet is received by the server.
- The server runs a generic script, that exposes the service (SSH, HTTP, Anything) to the client on the same (or on a new) port.
- If the server supports routing tables manipulation, the iptables can be modified and the client can keep communicating over the same port. see ./server.sh for more information.
Download & Use
Copyright (c) 2020 Avi Lumelsky