]HackingTeam[ KnowledgeBase Product
Search:     Advanced search

SSH Tunneling

Article ID: 23
Last updated: 16 Feb, 2015


If the customer doesn’t has a static public IP address with the possibility to configure the border router/firewall with port forward or DNAT/SNAT, we could set-up a temporary configuration by using any common Internet connection.


  • A free Anonymizer/VPS.

  • Possibility of using an SSH Client (for Windows) like Putty on the Collector.


A) Configure the server

Usually the sshd on CentOS is configured to allow the bridge only on local IP addresses so we need to check the sshd (server) configuration on the Anonymizer/VPS:

1. access the Anonymizer/VPS by using an SSH Client;

2. open with an editor the sshd config file (/etc/ssh/sshd_config), look for the GatewayPorts parameter and check if it’s properly configured to YES without the hash key;

  • GatewayPorts yes

3. save the config file and restart the ssh server.

B) Setup SSH Client Configuration

Set-Up the ssh tunnel through the SSH Client Configuration:

1. open an SSH Client on the Collector System. This example uses Putty;
2. in the Session config page:

  • fill-in the IP address of the Anonymizer/VPS;

SSH Tunneling - img 001

  • fill-in a name to save the session and save it.

SSH tunneling - img 002

3. explode the SSH config page and move to Tunnels config section;

  • fill-in the Source port that you want to be forwarded (RCS default setting is 80);
  • fill-in the destination IP/hostname (localhost or of the forward and the port (RCD default setting is 80);
  • check the flag on Remote;

SSH Tunneling - img 003

  • load this configuration by clicking on Add;

SSH Tunneling - img 004

  • check if the forwarded port is prolerly remote R80;
  • start the session by clicking on Open.

4. the tunnel will not be ready until you log-in to the Anonymizer/VPS by using a valid pair of credendials;

SSH Tunneling - img 005
5. after logging in, check if the sshd daemon is properly listening on the public interface (on forwarded port);

SSH Tunneling - img 006
6. check if the tunnel is up by trying to connect to port 80 of the Anonymizer/VPS (you could use telnet, nmap or a browser that allows you to see the Collector error message).

Article ID: 23
Last updated: 16 Feb, 2015
Revision: 7
document Public
Views: 13
Comments: 0
This article was:   Helpful | Not helpful
server anonymizer

Prev   Next
Anonymizer installation and configuration     Backend