Core
Essential
- Joined
- 21.09.20
- Messages
- 85
- Reaction score
- 262
- Points
- 53
Let's say we have three ssh (Russia, Australia, Switzerland) - perhaps one of the best bundles, since we want to make a chain of these ssh, so that each of the nodes does not know the real ip that initiates traffic (except for the incoming one) , and each of the sessions was encrypted with a unique key, that is, "internal" nodes will not be able to sniff traffic, except for the last one, it will serve as a starting point. The TOR network works according to this principle, the only difference is that the nodes in the chain will not change.
To implement the chain, we need an ssh client Putty
Step 1
Launch Putty
Connection-> SSH-> Tunnels
In Source Port we write any free port, for example 9048
Label Dynamic and IPv4 checkboxes
In Session, write the IP of the host and in the "Saved Sessions" field enter the name of the ssh country and click Save, so as not to make unnecessary movements in the future.
Press Open and connect. Roll up Putty, don't close it.
As a result, we set up a socks5 server on the local host (127.0.0.1:9048)
Step 2
Move on:
Putty launches
Connection-> SSH-> Tunnels
In Source Port write any free port, for example 9049
Designate Dynamic and IPv4 checkboxes
In Connection-> Proxy, and enter Proxy type: SOCKS 5, Proxy hostname: 127.0.0.1, Port: 9048, Do DNS name lookup at proxy end: Yes
In Session, write the IP of the host, in the Saved Sessions field, enter the name of the ssh country and click Save. Press Open and connect. We turn Putty.
What have we just done?
First, we connected to our local socks (127.0.0.1:9048) and as a result, all traffic goes through the first node. Second, we raised the socks5 server on the local host (127.0.0.1:9049), for subsequent connections.
As a result, repeating step two and changing the port number in the sixth paragraph (in our case, for the third node there will be port 9049), you can raise as many sockets as you like and forward traffic through them. On the last node, we also raise the socks server and specify it as a "socks proxy" in proxyfier.
As a result, you will be in the country of the last node. Everything is simple, in this way you can go around the entire planet.
I took the first port 9048 for a reason, because by raising a chain of three ssh, the last socks will be raised on port 9050, and this port listens to ProxyChains by the standard, that is, ProxyChains listens to the TOPA port out of the box, so it is more convenient, you do not need to go into the configs and you you know exactly which port, which country.
Be sure to change the DNS in the adapter settings.
With one command using proxychains:
No terminal support
Just throw the port
To implement the chain, we need an ssh client Putty
Step 1
Launch Putty
Connection-> SSH-> Tunnels
In Source Port we write any free port, for example 9048
Label Dynamic and IPv4 checkboxes
In Session, write the IP of the host and in the "Saved Sessions" field enter the name of the ssh country and click Save, so as not to make unnecessary movements in the future.
Press Open and connect. Roll up Putty, don't close it.
As a result, we set up a socks5 server on the local host (127.0.0.1:9048)
Step 2
Move on:
Putty launches
Connection-> SSH-> Tunnels
In Source Port write any free port, for example 9049
Designate Dynamic and IPv4 checkboxes
In Connection-> Proxy, and enter Proxy type: SOCKS 5, Proxy hostname: 127.0.0.1, Port: 9048, Do DNS name lookup at proxy end: Yes
In Session, write the IP of the host, in the Saved Sessions field, enter the name of the ssh country and click Save. Press Open and connect. We turn Putty.
What have we just done?
First, we connected to our local socks (127.0.0.1:9048) and as a result, all traffic goes through the first node. Second, we raised the socks5 server on the local host (127.0.0.1:9049), for subsequent connections.
As a result, repeating step two and changing the port number in the sixth paragraph (in our case, for the third node there will be port 9049), you can raise as many sockets as you like and forward traffic through them. On the last node, we also raise the socks server and specify it as a "socks proxy" in proxyfier.
As a result, you will be in the country of the last node. Everything is simple, in this way you can go around the entire planet.
I took the first port 9048 for a reason, because by raising a chain of three ssh, the last socks will be raised on port 9050, and this port listens to ProxyChains by the standard, that is, ProxyChains listens to the TOPA port out of the box, so it is more convenient, you do not need to go into the configs and you you know exactly which port, which country.
Be sure to change the DNS in the adapter settings.
With one command using proxychains:
Code:
sudo proxychains ssh - D 127.0 . 0.1 : 8181 username @ 142 . 98.11 . 21
No terminal support
Code:
sudo ssh - D 127.0 . 0.1 : 1080 - N test @ 62 . xxx . 100.xxx
Just throw the port
Code:
sudo ssh - t user @ srv1 - L 56443 : localhost : 56443 ssh user @ srv2 - L 56443 : localhost : 56443 - t ssh user @ srv3 - L 56443 : localhost : 443