Security Basics mailing list archives
Re: Tunnel any protocol over any protocol?
From: Brad Edmondson <brad.edmondson () tufts edu>
Date: Tue, 05 May 2009 12:56:31 -0400
Chip-I often use the SOCKS proxy option in OpenSSH server+client. You run an openssh server on your secure network, and then ssh to it with the switch -D 4444 (or any other port number >1024) to create a SOCKS proxy on your localhost to your ssh server on port 4444. This SSL's everything sent using the SOCKS tunnel, and many popular applications can use a SOCKS proxy (Firefox, Thunderbird, IE, etc.).
For non-SOCKS-aware applications, you can achieve similar results with SSH port forwarding.
Brad Edmondson UIT - Tufts University 617-627-5856 **Please note that no Tufts IT professional will ever ask for password or personal information via email. Such requests are fraudulent.** Chip Panarchy wrote:
Hello Is it possible to Tunnel any Protocol (within reason) over any other protocol? Eg; http tunnel, https tunnel, ftp tunnel, ssh tunnel etc. If yes, could you please tell me your preferred programs/tools/scripts for doing so? Thanks in advance, Panarchy ------------------------------------------------------------------------ This list is sponsored by: InfoSec InstituteLearn all of the latest penetration testing techniques in InfoSec Institute's Ethical Hacking class. Totally hands-on course with evening Capture The Flag (CTF) exercises, Certified Ethical Hacker and Certified Penetration Tester exams, taught by an expert with years of real pen testing experience.http://www.infosecinstitute.com/courses/ethical_hacking_training.html ------------------------------------------------------------------------
------------------------------------------------------------------------ This list is sponsored by: InfoSec InstituteLearn all of the latest penetration testing techniques in InfoSec Institute's Ethical Hacking class. Totally hands-on course with evening Capture The Flag (CTF) exercises, Certified Ethical Hacker and Certified Penetration Tester exams, taught by an expert with years of real pen testing experience.
http://www.infosecinstitute.com/courses/ethical_hacking_training.html ------------------------------------------------------------------------
Current thread:
- Tunnel any protocol over any protocol? Chip Panarchy (May 05)
- RE: Tunnel any protocol over any protocol? Danny Puckett (May 05)
- RE: Tunnel any protocol over any protocol? Jeff Johnson (May 06)
- Re: Tunnel any protocol over any protocol? Phil Bieber (May 06)
- RE: Tunnel any protocol over any protocol? Ken Kousky (May 06)
- RE: Tunnel any protocol over any protocol? Jeff Johnson (May 06)
- Re: Tunnel any protocol over any protocol? Brad Edmondson (May 05)
- Re: Tunnel any protocol over any protocol? Kurt Buff (May 06)
- Re: Tunnel any protocol over any protocol? Robin Wood (May 06)
- RE: Tunnel any protocol over any protocol? Murda Mcloud (May 06)
- Re: Tunnel any protocol over any protocol? Aarón Mizrachi (May 06)
- Re: Tunnel any protocol over any protocol? Muhammad Farooq-i-Azam (May 11)
- <Possible follow-ups>
- Re: Tunnel any protocol over any protocol? Nick Owen (May 05)
- Re: Tunnel any protocol over any protocol? v3nd3rs5uck (May 11)
- RE: Tunnel any protocol over any protocol? Danny Puckett (May 05)