+ All Categories

Download - SSH Tunneling

Transcript
Page 1: SSH Tunneling

- by Mahesh Bheema

Page 2: SSH Tunneling

Just a security enthusiast, Working as Security Analyst in Anthelio. Ex-Trainer in Innobuzz, Hyderabad.

[email protected]@0xmahesh

Page 3: SSH Tunneling

SSH is a secure replacement protocol for telnet as data is encrypted in transmission.

Secure Shell, a network protocol for secure data communication and remote command execution.

-- Wikipedia

Page 4: SSH Tunneling

SSH provides us…

Confidentiality

Integrity

Authentication

Page 5: SSH Tunneling

SSH tunnel is an encrypted tunnel, used to transfer unencrypted traffic over a network in an encrypted tunnel.

A Secure Shell tunnel, consists of an encrypted tunnel created through an SSH protocol connection.

--Wikipedia

Page 6: SSH Tunneling
Page 7: SSH Tunneling

Remote Shell

Securely connect to a remote shell.

Port Forwarding / tunneling

To divert unencrypted traffic to encrypted traffic.

X11 forwarding / VNC session tunneling

Secure remote Desktop / application.

Page 8: SSH Tunneling

Start ssh server by using command “service ssh start” in terminal.

If using a natted ip.

We can either port forward or add internal ip in DMZ.

Page 9: SSH Tunneling

Open putty client, enter IP & Port number of the SSH Server.

Configure settings in putty for tunnel as below, In Connections SSH Tunnels

In Source port, enter a port number. ex: 9999

In Destination, enter loopback address.

Select Dynamic Radio button.

Click on add, to use these setting for tunnel.

Click Open and enter user credentials of the Home PC

Configure proxy in browsers with IP Address “127.0.0.1” and Port number 9999. Use Sock Proxy instead of http.

Page 10: SSH Tunneling
Page 11: SSH Tunneling
Page 12: SSH Tunneling

Firefox: Open Options / Preferences. Go to advanced tab Network tab Settings. Select Manual Proxy, enter IP and Port details in

SOCKS proxy.

Chrome / IE: Open Internet Options. Go to Connections tab Lan settings Check Proxy Server and go to advanced tab, fill IP and

Port numbers in SOCKS proxy.

Page 13: SSH Tunneling

Questions!

Page 14: SSH Tunneling

Thank you all

Special Thanks to CA Technologies for providing venue.


Top Related