X11 - Port 6000
Basic info
How X11 Works
βββββββββββββββ Network βββββββββββββββ
β X Client β βββββββββββββββββββββββ>β X Server β
β (App/Shell) β X11 Protocol (Port 6000)β (Display) β
βββββββββββββββ <ββββββββββββββββββββββββββββββββββββββ
Remote LocalX11 Authentication Mechanisms
The .Xauthority File
Default Port Information
Reconnaissance & Enumeration
Port Scanning
Metasploit Scanner
Manual Connection Testing
Shodan Queries
Local Enumeration
Finding X11 Sessions
Finding .Xauthority Files
Extracting and Using Cookies
SSH X11 Forwarding Detection
Exploitation Techniques
1. Verify Anonymous Connection
2. Screenshot Capture
3. Keylogger (Keystroke Capture)
4. Remote Desktop Viewing
5. Command Execution
6. Getting a Reverse Shell
7. Clipboard Access
8. Screen Recording
Post-Exploitation
Privilege Escalation
Persistence
Lateral Movement
Advanced Techniques
X11 + Docker Escape
X11 in Kubernetes
Wayland Security Bypass
CVE Analysis: X11 Vulnerabilities
Tools Reference
Essential X11 Pentesting Tools
Installation
Custom Scripts
Defense & Hardening
Disable X11 Network Listening
Proper X11 Authentication
SSH X11 Forwarding Security
Monitor X11 Access Attempts
Migrate to Wayland
Security Best Practices
Detection & Incident Response
Detecting X11 Attacks
Incident Response Steps
Real-World Attack Scenarios
Scenario 1: Red Team Assessment
Scenario 2: Privilege Escalation
Scenario 3: Persistence via X11
Scenario 4: Lateral Movement
Troubleshooting Common Issues
"No protocol specified" Error
"Connection refused" Error
Permission Issues
Display Not Found
Cheat Sheet
Quick Reference
Common Ports
Important Files
Conclusion
Additional Resources
Last updated