ben20 Posted February 21, 2009 Report Posted February 21, 2009 Caut tutoriale care erau pe aici cu ssh tunnel etc proxy sa devin full reloaded anonim dati un hand ? ca le tot caut ca prostu Quote
paxnWo Posted February 21, 2009 Report Posted February 21, 2009 This article is a crash course in creating an SSH Tunnel to use it as a SOCKS proxy. To do this you need a couple of things:1) Linux or Windows2) Remote host running OpenSSH (Hacked or otherwise..)3) FirefoxThere are different methods to do this in Linux and Windows (puTTy). I will detail both of these.[Linux Method]First, open up a terminal shell. In this example the ip of our rooted victim is 77.33.22.11. Here is the command we will use: Text Code: Remove Scroll Barsbl0ck# ssh -D 3333 root@77.33.22.11root@77.33.22.11's password:root@pwnt#Before going any farther let me quickly show you how this command works.Syntax: ssh -D <port> <user>@<ip>The -D flag tells it to bind to the local port (which we enter <port>).So now that we've set up our SSH Tunnel we head over to Firefox. Here are the steps to configuring our tunnel as a SOCKS proxy.1. Edit -> Preferences2. Go to the Network tab3. Settings4. Check Radio Button "Manual proxy configuration"5. SOCKS Host: localhost Port: 3333Now you can navigate over to http://whatismyip.com to double check that your proxy has worked successfully.[Windows Method]This method requires the puTTy Windows SSH client.Here are the steps we will take to configure puTTy for SSH Tunnelling.1. Under the Session tab enter the IP Address and Port of the rooted SSH server. Make sure the SSH radio button is checked.2. Click on the SSH -> Tunnels tab on the left. Fill in the source port (3333). Check off Auto and Dynamic underneath. Leave destination blank.3. Connect to the SSH server.4. Configure firefox (same instructions as above).[Conclusion]SOCKS proxies are very useful mainly because of their speed and anonymity. The only snag being that you must have access to a remote SSH box. In the future i may have a paper on how to achieve SSH access on a target. Quote
ben20 Posted February 21, 2009 Author Report Posted February 21, 2009 Dar nu am niciun ip hacked sau cu ssh Quote