gasildev.blogg.se

Ssh proxy socks
Ssh proxy socks












ssh proxy socks
  1. #Ssh proxy socks full
  2. #Ssh proxy socks software
  3. #Ssh proxy socks Pc

I'm guessing it wouldn't be hard to determine that you're browsing the web, though I don't know if this is easily discovered with existing tools. Given just the bursts of data, it should be obvious that you're not just using a shell.

  • A side-channel attack or advanced frequency analysis.Īn example of frequency analysis: there are certain patterns to video and audio I've even heard of reports suggesting encrypted live audio can be deciphered based on the volume of data (pauses compress well, words not as well, and it's all real-time).
  • Requesting (or intercepting) your home ISP's unencrypted side of your tunnel.
  • Software/hardware on your computer or work area to intercept your local unencrypted data.
  • A Man-in-the-Middle attack – Make sure you've got the SSH fingerprint right.
  • Accidental data leakage (the other answers here address that).
  • ssh proxy socks

    There are a few ways more information can be gleaned: The exact content of this traffic should be opaque (but even this is not guaranteed) without something malicious or some very advanced analysis. Please spare me of answers that I should not use work for personal stuff, and etc., I do this with the knowledge of my boss, who is sick of the IT stuff and she basically instructed me to make access to social sites.Īn investigation should easily conclude that a computer on their network, assigned to you, is connecting to a consumer-grade ISP host on port 443 using SSH and not HTTPS (content inspection can easily determine what protocol you're using, including the ability to detect SSH traffic).

    #Ssh proxy socks software

    I doubt they use any special proxy to incorporate Man in the Middle attack, it would be out of their knowledge, and guess the software would be too pricey for them.

    #Ssh proxy socks Pc

    I guess they see the IP address putty connects to (over port 443, not 22), but that is all, they do not see anything else, just the encrypted stream between my router and PC at work. I had to set company proxy in Putty to have access to Internet.Įverything is working fine, and I think I'm safe on this, but the proxy I had to set in Putty bothers me a little, as I'm not sure if that proxy can see the traffic that comes from Putty? Or the connection is still encrypted, no matter if that goes over the company proxy, the socks5 tunnel is established through the company proxy. PuTTY is configured for socks5 proxy tunnelling, and Firefox is enabled to send DNS requests over SSH, and Chrome also (I checked dnsleaktest, and my home configured google public DNS is used, not the company one, no DNS leaks here). I use PuTTY to establish a SSH connection to my home router using port 443. I have at home a "ddwrt" router with a SSH server.

    ssh proxy socks

    It is set as a HTTP proxy and the option to use this for all types of connections is checked. Each PC has a dedicated IP and a proxy is used.

    #Ssh proxy socks full

    At work we are all using Windows 7+, with full administrative privileges.














    Ssh proxy socks