Learn how to tunnel HTTP traffic through SSH in this video.
- [Instructor] We can also user remote port forwarding…to allow access to websites,…using exactly the same technique as we used for SSH.…I'll use SSH to connect to my Metasploitable server…and tell it to open port 8080, and to direct traffic…to and from that port to port 80 on the Ubuntu server,…which to me, here, is localhost.…I'll use the R switch to tell SSH…that this is a remote forward port.…And I'll use the minus NNT switch to stop SSH…opening a terminal session.…
And minus F to background the SSH process.…SSH has now created the tunnel and gone into the background.…We've now got a remote tunnel connecting Metasploitable…to my Ubuntu web server.…Let's try it out.…From my Kali system, I can connect to 10.0.2.8, 8080.…
Port 8080 are Metasploitable.…We can see the Ubuntu default…Apache web page is displayed.…The SSH call from Ubuntu caused Metasploitable…to open port 8080 and route it through to Ubuntu port 80.…
- How tunneling works
- Running a local SSH tunnel
- Dynamic SSH tunneling
- Pivoting with Armitage and Metaspoit
- Exfiltrating using DET and DNS
- Covert exfiltration with Cachetalk
- Using PyExfil to exfiltrate over HTTPS
Skill Level Advanced
Ethical Hacking: Penetration Testingwith Lisa Bock1h 29m Intermediate
Penetration Testing Essential Trainingwith Malcolm Shore2h 29m Intermediate
Penetration Testing: Advanced Kali Linuxwith Malcolm Shore2h 22m Intermediate
1. Preparing the Lab
Next steps1m 38s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.