Core

Regular
Joined
21.09.20
Messages
85
Reaction score
248
Points
33
Let's say we have three ssh (Russia, Australia, Switzerland) - perhaps one of the best bundles, since we want to make a chain of these ssh, so that each of the nodes does not know the real ip that initiates traffic (except for the incoming one) , and each of the sessions was encrypted with a unique key, that is, "internal" nodes will not be able to sniff traffic, except for the last one, it will serve as a starting point. The TOR network works according to this principle, the only difference is that the nodes in the chain will not change.

To implement the chain, we need an ssh client Putty

Step 1

Launch Putty

Connection-> SSH-> Tunnels

In Source Port we write any free port, for example 9048

Label Dynamic and IPv4 checkboxes

In Session, write the IP of the host and in the "Saved Sessions" field enter the name of the ssh country and click Save, so as not to make unnecessary movements in the future.

Press Open and connect. Roll up Putty, don't close it.

As a result, we set up a socks5 server on the local host (127.0.0.1:9048)

Step 2
Move on:

Putty launches

Connection-> SSH-> Tunnels

In Source Port write any free port, for example 9049

Designate Dynamic and IPv4 checkboxes

In Connection-> Proxy, and enter Proxy type: SOCKS 5, Proxy hostname: 127.0.0.1, Port: 9048, Do DNS name lookup at proxy end: Yes

In Session, write the IP of the host, in the Saved Sessions field, enter the name of the ssh country and click Save. Press Open and connect. We turn Putty.

What have we just done?

First, we connected to our local socks (127.0.0.1:9048) and as a result, all traffic goes through the first node. Second, we raised the socks5 server on the local host (127.0.0.1:9049), for subsequent connections.

As a result, repeating step two and changing the port number in the sixth paragraph (in our case, for the third node there will be port 9049), you can raise as many sockets as you like and forward traffic through them. On the last node, we also raise the socks server and specify it as a "socks proxy" in proxyfier.

As a result, you will be in the country of the last node. Everything is simple, in this way you can go around the entire planet.

I took the first port 9048 for a reason, because by raising a chain of three ssh, the last socks will be raised on port 9050, and this port listens to ProxyChains by the standard, that is, ProxyChains listens to the TOPA port out of the box, so it is more convenient, you do not need to go into the configs and you you know exactly which port, which country.

Be sure to change the DNS in the adapter settings.

With one command using proxychains:

Code:
sudo proxychains ssh - D 127.0 . 0.1 : 8181 username @ 142 . 98.11 . 21

No terminal support

Code:
sudo ssh - D 127.0 . 0.1 : 1080 - N test @ 62 . xxx . 100.xxx

Just throw the port

Code:
sudo ssh - t user @ srv1 - L 56443 : localhost : 56443 ssh user @ srv2 - L 56443 : localhost : 56443 - t ssh user @ srv3 - L 56443 : localhost : 443
 
Top Bottom