[index][raw][main]
[noise@unvalidatedinput]$ man Portquiz
Portquiz(1) User Manuals Portquiz(1)
NAME
Portquiz
Wed 8 Apr 21:29:12 BST 2015
DESCRIPTION
How to quickly test egrees filtering? A remote machine that responds on all 65535 ports
becomes handy.
Check out http://portquiz.net:
$ w3m -dump http://portquiz.net:1234
Outgoing port tester
This server listens on all TCP ports, allowing you to test any outbound TCP
port.
You have reached this page on port 1234.
Your network allows you to use this port. (Assuming that your network is not
doing advanced traffic filtering.)
Network service: unknown
Your outgoing IP: 194.221.X.X
Test a port using a command
$ telnet portquiz.net 1234
Trying ...
Connected to portquiz.net.
Escape character is '^]'.
$ nc -v portquiz.net 1234
Connection to portquiz.net 1234 port [tcp/daytime] succeeded!
$ curl portquiz.net:1234
Port 1234 test successful!
Your IP: 194.221.X.X
$ wget -qO- portquiz.net:1234
Port 1234 test successful!
Your IP: 194.221.X.X
Test a port using your browser
In your browser address bar: http://portquiz.net:XXXX
Examples:
http://portquiz.net:8080
http://portquiz.net:8
http://portquiz.net:666
You can speed up your egress scan with xargs to run 10 parallel processes:
$ seq 1 65535 | xargs -P10 -I{} bash -c "nc -vzw1 portquiz.net {} 2>&1 | grep succeeded"
Connection to portquiz.net 2 port [tcp/compressnet] succeeded!
Connection to portquiz.net 1 port [tcp/tcpmux] succeeded!
Connection to portquiz.net 8 port [tcp/*] succeeded!
It also becomes handy when testing through a proxy to figure out which ports are allowed:
$ echo 1 65535 | xargs -P10 -I{} bash -c "curl --proxy squid.example.com:8080 -m1 portquiz.net:{} -s 2>&1 | paste - - "
Port 80 test successful! Your IP: 194.221.X.X
Port 8080 test successful! Your IP: 194.221.X.X
Port 443 test successful! Your IP: 194.221.X.X
Port 8443 test successful! Your IP: 194.221.X.X
Linux April 2015 Portquiz(1)
[noise@unvalidatedinput]$ ∎