SSH Connections
On the destination machine you want to be able to connect to
$ ssh -f -i
Now you can SSH from source_machine to the destination through SSH tuneling:
$ ssh destination_user@localhost -p 2222
Using the details above
setup to source machine listen on port 8080 and send traffic down the tunnel (sleep will make it remain persistent for 8 hours)
$ ssh -p 2222 desitination_user@localhost -C -D local_ip_add:8080 -f sleep\ 28000
Check it
For web browsing, open firefox and go to network settings, then configure to point SOCKS at local_ip_add:8080. DNS proxying can also be set in Firefox by changing the network.proxy.socks_remote_dns value in about:config to true
$ss -nlp | grep 8080
0 128 127.0.0.1:8080 *:* users:“ssh”,4939,5
For web browsing, open firefox and go to network settings, then configure to point SOCKS at local_ip_add:8080. DNS proxying can also be set in Firefox by changing the network.proxy.socks_remote_dns value in about:config to true