Jump to content
Joao

Tunnel data

Recommended Posts

Posted

In this tutorial we will learn about data traveling through a tunnel.

First need to review a few things:

- To be a connection between two computers at the very least there must be a client and a server.

- The server is waiting for connections (listen mode "Listing")

- The customer makes the connection. (Mode "connect")

Example:

OQAAAFF7Z1iVIJG5SEH2lKQ7eIQ0oUxH4rgKrwTQ11tVtr3eWAOw1PtGXIDT69SIU6UPLhajzfHEpbjZBT_haPMFjBwAm1T1UIqSGFyvVfTlkfousU1ihAn8pW8r.jpg

The web server is "waiting" your connection.

"Tunnel" data is to make these data to flow through a third computer, which will serve as a "connection" between client and server.

OQAAAE1C8IAXJI4C0U_KqfHa5yBBcW_Cc3XBphKayqBtSIBX85RcTUYNKU4GZIB2UOS3wMzowIrsGXgxyDzVHVTjcFMAm1T1UD5Xjiw6RHDSWI4l7KCSt8x_WkkJ.jpg

We can use a tunnel to studies of communication protocols, for through the tunnel you can view the commands between client and server.

CREATING A TUNNEL.

Let's use the software insecuritynet 3.X to create our tunnel.

First let's define who will be the client, the tunnel and the server:

Client -> Our computer.

Tunnel -> Program insecuritynet

Server -> FTP server unicamp (Public Servant)

Let's create our tunnel.

1 -) Open the program and enter:

Start -> Protection -> Port Tunnel

OgAAANN-Xo0r_OLbGYTu0llpxaibmV16cjl2FdGS1RJMvELNf6uE6DDd8k9T0nuC2gpZfC9sRkQtiHzcl6pLY4FbwV4Am1T1UPP3x7p0ndPesMaPKl56xMHlA-zC.jpg

We will choose how the tunnel will be connected:

Our tunnel should wait for a connection and connect to the server unicamp.

So we have to use the "Listing -> Connect"

Let us set up the tunnel to wait on port 21 and redirect the connection to the server "ftp.unicamp.br" on port 21.

The port 21 is the default port for FTP servers.

OgAAAC8j-ybO89Z5pKwo70K46c6szq9gB647OR92Ms8w5-5mMO_7D3v6v2Ch7VOcbFdgzhvJdj8H81FRjYrFUGhC9CcAm1T1UOVAOzeXPkyvXtdFWHz-cn8slJOW.jpg

The tunnel will be open and will wait for connection.

OQAAACooi5U66v7y0t97OxUttjumyUPDBVT3Pm3kCbLgiEqAgmSFnkZzIcnMkTAoczGOJGuKSEc5CgZkqs7Y55zjX-0Am1T1UPMpwp52fuAulthjkgXqjJxEAT8t.jpg

Let's create the connection.

Now our computer is "virtually" the FTP server unicamp

Let's connect in our "SUPPOSED local FTP server"

OQAAADGOajn0sE6JFIVtFjeJ1jb97BiC5MF56rpNjPJqyRQSm-y0mLXSIx5QKfPJUU-RwueQ5wSZpGcvPYi0vmD-K1UAm1T1UC7cXh44Ev9m-4cwfSSSNlMO6Xqe.jpg

Note the TUNEL

OgAAAMXJ5trqOmNbHTvYhhqluHrdKn05fdD_GgyqWRhExAe2xRwbd2m5zTREahvwb860Fx7JdMUQozzS3UIri8eatcUAm1T1ULKdLt5HUwrw_rKWKn34EKt69Agh.jpg

You can view all communication between client and server.

GREEN: data are input data (our client)

BLUE: The data are Output Server (Unicamp)

When you create a tunnel of this kind your computer becomes a server too.

If another computer connect to the tunnel, will be automatically connected to your redirection.

In this example will redirect a service for receiving email (POP)

OQAAAChbw7bytWmqr151O-t-bu09IGhvTAo33Av394cQkMVTUnAv6Ab3gGBXXQH4etRN23R3A13bZaBIQ7DKy70CPnAAm1T1UCHq8dnPR_0MmULdjS0zYaPTHWSq.jpg

---

OQAAAE8Qk7RZm6CwKUlfQq8lVOPhApdn__O-25tnXdPX0bVpDsG7p4IPHMcI48iTue2HUxXamy0NveejQwq3Y6jbExUAm1T1UHd3ShjtMvs8dNpnbKGSlU9bbYoL.jpg

Note the tunnel when a remote computer connects to "pop our service."

OgAAAEbg-TBQ5ZFJkqwuqMDf4bsAafKCEcYL70NOwMCeUzz1hiEWBt-QBwag0t-72AZIWRbbzJ0eCcXOeM2QUtFEvHkAm1T1UGtN5UkPTSWkT0UZAQi42I1hnyEr.jpg

The IP "192.168.0.1" connected to our port 110 and was redirected to the IP address 200.221.4.119 (server pop)

The data in green are the computer "192.168.0.1". The data in blue are the POP server.

As it showed me the tunnel is a great tool to study protocols and connections.

In the next tutorial I'll post about using a tunnel as a VPN server connection between two computers with IP NAT (computers which can not "see").

Posted

Just use PuTTY, dude, and a SSH server. About that VPN tut, what's so difficult? I mean, install OpenVPN on the remote host, local forward 1194 to your PC (S2C). The rest can be achieved from the server.ovpn file :)

Posted
Just use PuTTY, dude, and a SSH server. About that VPN tut, what's so difficult? I mean, install OpenVPN on the remote host, local forward 1194 to your PC (S2C). The rest can be achieved from the server.ovpn file :)

Yes, you're right.

But the tutorial is not hard, actually becomes much more facio because you have several options for connections with just one click.

Listen <- TUNEL -> Connect

Listen <- TUNEL -> listen

Connect <- TUNEL -> Connect

You have all the options for INPUT and OUTPUT TUNEL only enabling the tool without the need for logs, etc. ..

Posted
Yes, you're right.

But the tutorial is not hard, actually becomes much more facio because you have several options for connections with just one click.

Listen <- TUNEL -> Connect

Listen <- TUNEL -> listen

Connect <- TUNEL -> Connect

You have all the options for INPUT and OUTPUT TUNEL only enabling the tool without the need for logs, etc. ..

Sorry, but in my opinion, that's a really bad choice. You need flexibility in this kind of situations, logs are pretty good to know what happens and where is the problem and if there is one, where and how to act immediately.

Posted
Sorry, but in my opinion, that's a really bad choice. You need flexibility in this kind of situations, logs are pretty good to know what happens and where is the problem and if there is one, where and how to act immediately.

This tunnel is only one software tool.

This program was developed precisely to be flexible in different situations.

Watch the video:

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...