https://www.techrepublic.com/article/over-75-of-android-apps-are-secretly-tracking-users/
https://www.techrepublic.com/article/over-75-of-android-apps-are-secretly-tracking-users/
Have you ever wanted to ssh to your Linux box that sits behind NAT? Now you can with reverse SSH tunneling. This document will show you step by step how to set up reverse SSH tunneling. The reverse SSH tunneling should work fine with Unix like systems.
Let’s assume that Destination’s IP is 192.168.20.83 (Linux host that you want to access).
You want to access from Linux client with IP 8.7.6.5
Destination (192.168.20.83) <- |NAT| <- Source (8.7.6.5)
ssh -R 1339:localhost:22 sourceuser@8.7.6.5
* port 1339 can be any unused port.
ssh destinationuser@localhost -p 1339
Destination (192.168.20.83) <- |NAT| <- Source (8.7.6.5) <- 3rd party server
ssh sourceuser@8.7.6.5
ssh destinationuser@localhost -p 1339
* the connection between destination and source must be alive at all time.
Tip: you may run a command (e.g. watch, top) on Destination to keep the connection active.
Strict requirement: a remote linux server with an openssh-server active daemon.
Let’s open PuTTY and start:
Now the tunnel is set up to localhost on the tcp port 1339 that you specified as source port.
Now you could setup you progrma to use a SOCKS5 proxy to use the tunnel.
Pure Line theme by Theme4Press • Powered by WordPress Paolo Pizzolongo Chi è veramente ricco non ha bisogno dei soldi
Recent Comments