Joao Posted April 24, 2010 Report Posted April 24, 2010 In this tutorial we will learn about data traveling through a tunnel.First need to review a few things:- To be a connection between two computers at the very least there must be a client and a server.- The server is waiting for connections (listen mode "Listing")- The customer makes the connection. (Mode "connect")Example:The web server is "waiting" your connection."Tunnel" data is to make these data to flow through a third computer, which will serve as a "connection" between client and server.We can use a tunnel to studies of communication protocols, for through the tunnel you can view the commands between client and server.CREATING A TUNNEL.Let's use the software insecuritynet 3.X to create our tunnel.First let's define who will be the client, the tunnel and the server:Client -> Our computer.Tunnel -> Program insecuritynetServer -> FTP server unicamp (Public Servant)Let's create our tunnel.1 -) Open the program and enter:Start -> Protection -> Port TunnelWe will choose how the tunnel will be connected:Our tunnel should wait for a connection and connect to the server unicamp.So we have to use the "Listing -> Connect"Let us set up the tunnel to wait on port 21 and redirect the connection to the server "ftp.unicamp.br" on port 21. The port 21 is the default port for FTP servers. The tunnel will be open and will wait for connection. Let's create the connection. Now our computer is "virtually" the FTP server unicamp Let's connect in our "SUPPOSED local FTP server" Note the TUNEL You can view all communication between client and server. GREEN: data are input data (our client) BLUE: The data are Output Server (Unicamp) When you create a tunnel of this kind your computer becomes a server too. If another computer connect to the tunnel, will be automatically connected to your redirection. In this example will redirect a service for receiving email (POP) --- Note the tunnel when a remote computer connects to "pop our service." The IP "192.168.0.1" connected to our port 110 and was redirected to the IP address 200.221.4.119 (server pop) The data in green are the computer "192.168.0.1". The data in blue are the POP server. As it showed me the tunnel is a great tool to study protocols and connections. In the next tutorial I'll post about using a tunnel as a VPN server connection between two computers with IP NAT (computers which can not "see"). Quote
Fitty Posted April 24, 2010 Report Posted April 24, 2010 Just use PuTTY, dude, and a SSH server. About that VPN tut, what's so difficult? I mean, install OpenVPN on the remote host, local forward 1194 to your PC (S2C). The rest can be achieved from the server.ovpn file Quote
Joao Posted April 25, 2010 Author Report Posted April 25, 2010 Just use PuTTY, dude, and a SSH server. About that VPN tut, what's so difficult? I mean, install OpenVPN on the remote host, local forward 1194 to your PC (S2C). The rest can be achieved from the server.ovpn file Yes, you're right.But the tutorial is not hard, actually becomes much more facio because you have several options for connections with just one click. Listen <- TUNEL -> Connect Listen <- TUNEL -> listenConnect <- TUNEL -> Connect You have all the options for INPUT and OUTPUT TUNEL only enabling the tool without the need for logs, etc. .. Quote
Flubber Posted April 25, 2010 Report Posted April 25, 2010 Yes, you're right.But the tutorial is not hard, actually becomes much more facio because you have several options for connections with just one click. Listen <- TUNEL -> Connect Listen <- TUNEL -> listenConnect <- TUNEL -> Connect You have all the options for INPUT and OUTPUT TUNEL only enabling the tool without the need for logs, etc. ..Sorry, but in my opinion, that's a really bad choice. You need flexibility in this kind of situations, logs are pretty good to know what happens and where is the problem and if there is one, where and how to act immediately. Quote
Joao Posted April 25, 2010 Author Report Posted April 25, 2010 Sorry, but in my opinion, that's a really bad choice. You need flexibility in this kind of situations, logs are pretty good to know what happens and where is the problem and if there is one, where and how to act immediately.This tunnel is only one software tool.This program was developed precisely to be flexible in different situations.Watch the video: Quote