Loading...
 

SSH Reverse Proxying

 SSH Connections

Reverse tunnelling

On the destination machine you want to be able to connect to
$ ssh -f -i -R 2222:localhost:22 source_user@source_machine -N

Now you can SSH from source_machine to the destination through SSH tuneling:
$ ssh destination_user@localhost -p 2222

 Setup a SOCKS proxy

Using the details above

setup to source machine listen on port 8080 and send traffic down the tunnel (sleep will make it remain persistent for 8 hours)

$ ssh -p 2222 desitination_user@localhost -C -D local_ip_add:8080 -f sleep\ 28000

Check it
$ss -nlp | grep 8080
0      128                    127.0.0.1:8080                          *:*      users:“ssh”,4939,5

For web browsing, open firefox and go to network settings, then configure to point SOCKS at local_ip_add:8080.  DNS proxying can also be set in Firefox by changing the network.proxy.socks_remote_dns value in about:config to true