SSH Tunneling?

No explicit questions like "how do I hack xxx.com" please!
Post Reply
User avatar
ayu
Staff
Staff
Posts: 8109
Joined: 27 Aug 2005, 16:00
18
Contact:

SSH Tunneling?

Post by ayu »

1: What is SSH Tunneling?
2: What is it good for?
3: How does it work?
4: Why SSH Tunneling?, what makes it possible? why not FTP Tunneling or something :/
"The best place to hide a tree, is in a forest"

pseudo_opcode
cyber messiah
cyber messiah
Posts: 1201
Joined: 30 Apr 2006, 16:00
17
Location: 127.0.0.1

Post by pseudo_opcode »


Ameradi
On the way to fame!
On the way to fame!
Posts: 46
Joined: 20 May 2005, 16:00
18
Location: Germany
Contact:

Post by Ameradi »


User avatar
ayu
Staff
Staff
Posts: 8109
Joined: 27 Aug 2005, 16:00
18
Contact:

Post by ayu »

Thanks for the answers ^^. but in what way could this be good for "malicious" purposes? :? , just wondering because i have seen it on other security sites.
"The best place to hide a tree, is in a forest"

p99
Fame ! Where are the chicks?!
Fame ! Where are the chicks?!
Posts: 291
Joined: 14 Oct 2006, 16:00
17
Location: Some hippy's van
Contact:

Post by p99 »

It's just using a proxy.

You obviously don't want your target to know who you are. Same as if you were trying to get into a site via the browser. You would generally proxy your connection.

Shh tunneling is just a means of going through several computers so joe schmoe is the first accused cracker and not neo130.

Of course of does no good if the log trail still exists :wink:

User avatar
bad_brain
Site Owner
Site Owner
Posts: 11636
Joined: 06 Apr 2005, 16:00
19
Location: In your eye floaters.
Contact:

Post by bad_brain »

SSH tunneling is used to evade malicious activities like sniffing. if you transfer a txt-file through FTP for example everything is transmitted in clear text so an attacker could sniff the data and read everything.
but if you tunnel the connection through SSH it uses the encryption provided by the SSH protocol, so an attacker would have a hard time trying to get a grip on your data.
and yes, it can also act like a proxy. let's say port 23 is blocked for some reason (on work or school) you can tunnel the connection through SSH which uses port 21... :wink:

User avatar
ayu
Staff
Staff
Posts: 8109
Joined: 27 Aug 2005, 16:00
18
Contact:

Post by ayu »

Awesome...me likes : p
"The best place to hide a tree, is in a forest"

Post Reply