For example, try to connect to 4chan or exploit-db with CLI but also with a browser
Port Filtering
Test for other ports: 22, 21, 23, etc.
$ports =@(20,21,22,23,25,53,80,110,143,443,465,587,993,995,3306,3389,8080)$hostname ="portquiz.net"foreach ($port in $ports) { $result =Test-NetConnection-ComputerName $hostname -Port $port -InformationLevel Detailedif ($result.TcpTestSucceeded) {Write-Output"Port $port is open on $hostname" }}
Protocol Filtering
For example, if port 22 is blocked, also test for protocol filtering: SSH on port 443 ?
Server side:
sudonano/etc/ssh/sshd_config# Add or change portPort443# Restart SSHsudosystemctlrestartssh# orsudoservicesshrestart# If nesserary open port 443sudoufwallow443/tcp
Try to connect over port 443
ssh -p 443 username@server_ip
The Protocol Filter feature is used to block unwanted traffic from your network. The feature is commonly used to make sure employees, students or end users are using their Internet access for its intended productive use. The filter can block dozens of different protocols, including: peer-to-peer traffic (Source: ClearOS)
# Host discoverynet.probeon# See all hostnet.show# ARP spoofsetarp.spoof.targets192.168.37.133arp.spoofon# Spoof the entire subnet /!\ not recommendedsetarp.spooftargets# By default only connections to and from the external network will be spoofed# Spoof internal connectionsetarp.spoof.internal# Capture datanet.sniffon# Save the captured packet to pcapsetnet.sniff.outputfilename.pcap# DNS spoofingsetdns.spoof.domainsgithub.comdns.spoof.on