SSH Tunneling Explained
Vložit
- čas přidán 3. 07. 2024
- 🎵Teach me how to tunnel, teach me, teach me how to tunnel🎵 Ever gotten frustrated because your school or your work blocks fun/entertaining sites that can help you unwind and relax therefore increasing your productivity? SSH Tunneling is a good secure way to bypass firewalls that block sites. But that's not all! Order now and we'll also toss in local and reverse port forwarding! Check out the video to figure out what the heck I'm talking about and the magic SSH Tunneling has to offer!
_____________________________
📲🔗🔗📲 IMPORTANT LINKS 📲🔗🔗📲
______________________
List of common TCP/IP ports - web.mit.edu/rhel-doc/4/RH-DOC...
Putty - www.putty.org/
Serveo - serveo.net
_____________________________
💰💰💰💰 SUPPORT THE SHOW 💰💰💰💰
______________________
www.tinkernut.com/donate
_____________________________
🤔💡🤔💡 SUBMIT YOUR IDEAS 🤔💡🤔💡
______________________
www.tinkernut.com/ideas
____________________________
📢📢📢📢 Follow 📢📢📢📢
____________________________
redd.it/5o3tp8
instagram.com/
/ tinkernut
/ tinkernut
The simplest, very best explanation and comprehensive coverage I have seen on this subject for several decades - no ever!
Thanks! That really means a lot :-)
My pleasure.
This is exactly what I thought too! The ship annimation is what did it for me. Why has it taken so long for me to see that analogy used to explain ports, duh. Why have I not seen this used before?! Why didn't I think of that already?!! Awesome, definitely using it for staff training tomorrow.
@Tinkernut
Not the tunneling ELON_MUSK boaring company does 😂😂😂😂
Best line
I love how you explain things, and the visuals that you use make it easier to understand. 👍🏻
FANTASTIC! I live in Thailand where nobody is available to help me figure out things like this, so I do my best to learn myself by Googling to death by chasing endless rabbits down multiple deadend rabbit holes! 😵 I've been fighting locally provided routers to set up port forwarding repeatedly over the years. Crappy at best instructions available, sometimes only in Thai! NOW I see tunnelling is all I need! My GOD man, THANKS! (Donation to come!)
That is a lot of information to absorb. Thank you, I will have to go through it in super slow-mo.
@Nobody Knows ohh we've got a smart guy here back off everyone
@@Synthels you are a special one aren't you
@@digantchandel4152 he deleted the comment, can't you tell?
By far, the best explanation on ssh tunneling I've seen!
I like this intro to tunneling. Thank you.
One thing important to mention is that you are not "bypassing" the firewall--you are using a port allowed by the firewall to use a service (like RDP in the demo) the firewall blocks.
this seems so trivial to overlook but yet is very crucial to understand, props for making this clear to neophytes like me!
you just described a bypass.
Of course, if the firewall is blocking RDP, it's almost certainly also blocking SSH.
I've read a couple of posts on ths subject, I was not satisfied wth the explanations and I kept looking. This is the final destination for me. Well done.
This was great! Excellent explanation. Can't believe it took me this long to find your channel!
You are the coolest person making things so simple and exciting. Wish I could see you making more videos around networking!
Awesome!, this has been great help to wrap my head around the final pieces of how this work (working with same things in school).
Thank you! Such a great, no BS explaination.
Your videos in general are pretty "Darg-an-spectacular". Another amazing explanation! [*clapping hands*]
The better tutorial in video about SSH Tunnel and Sockets Proxy. Thank you very much!
Just watched your video on port forwarding, your explanations are so easy to understand.
Being lefthanded, it is kinda nice seeing boats and berthing explanations. thanks.
You make it easier to understand, thank you!
Great video. Excellent instructions. Very clear. Thanks
I knew what ssh was this whole time I just never knew executing it was easy asf. U deserve my sub
Really good summary, thank you
bruh you deserve more recognition
Nice, Clear, to the point with some nerdy humor... First video i've seen from you, directly subbed... Thanks!
its the best explanation of ssh tunneling. Thanks a lot!
Cool stuff! Thanks for an educational and informative presentation!
you are a life save, God bless you, Thankyou so much
Simple explanation...working perfectly
This was a great video, thank you very much!
this is a great explanation. Thanks, man
if you want to connect to your home computer from work, you have to specify an external IP address (and not internal like the did). I know you know it, but you should mention it. Also you need to enable port forwarding on your adsl router, to forward the public ip, port, to local port, local ip
Nice explanation, sir!! Really appreciate that.
i may have to rewatch this because i think my question. is answered in last comments he makes.....
Don't forget DDNS. Remember, a standard residential DSL/cable/fiber Internet connection uses a dynamic IP address (unlike SME or enterprise Internet, which always have a static IP address).
thank you. stuff like that is really confusing if youre new to a concept
Thanks for the video. I literally only heard SSH and nothing about what it was. Im going to be using this.
i don't know but i really like your videos man , so clean , good job
Great information to get started Thanks!
wow man, this is a really great video.
Thanks, I am doing my OSCP at the moment and everything, even the buffer overflows have been totally fine, but the abstractness of SSH port forwarding (reverse specifically) has me baffled! This video has helped
Thank you for uploading such a good video and explanation of ssh tunnels
U r the best :) Many thx. The explanation is step by step and quite easy to understand. Well done!
The best explanation Ever!!!!
I have no use for any of this but defiantly good to know and widened my knowledge!
Nice tips dude !
This is what I do with my own server used for VR work. The administration panel is on a non-standard port and the only protection is a basic username/password. To really secure it, the port is not exposed to the internet and has no username/password requirement, meaning a local connection is needed, which is what is normally tunneled.
A REALLY clever trick is to use a similar idea with say PHPMyAdmin. It has an access rule to ONLY allow the server itself to access it. This forces the entry to be from a tunneled SSH session.
I love it! And I subscribed. Best wishes Sir!
Very great info!
Thanks!
Just awesome👍
This is GREAT. Thank You.
simple and extremely helpful. thx
thank you sooo much for this, and for that in port forwarding Mr Tinkernut
Great stuff.. ive been wondering how to tunnel outside of a secure network. Im going to try this at work when i get a chance. Ofcourse with permission!
amazing explanation with examples and animation :-)
i JUST LOVED THIS VIDEO PLEASE DO MORE NETWORK VIDEOS
Thank You So Much ❤
Very well explained...thanks
I love you, BRO. Your video helped.
love your videos!!
I like the way u teach ....keep on buddy
You are a gem!
Thank you so much !!!!
Thank you sir, now I get it.
brilliant explanation
Great guide!
Very nice explaining
Sir that's very good . Good Explanation with good Example. I loved it
Very good explanation
Simply Awesome
great, interesting and with expertise. thanks
Awesome representation
That was great! Thanks
Thanks for this video. It answered a number of questions I've had about SSH. I'd subscribe, but I'm already a subscriber.... :-)
This is useful information, indeed.
This video is beautiful and i want to cry, i love you dude, please keep your videos coming you are a true plus to humanity
very nice explanation.
Good stuff champ!
How to get fired from work.
Easy , stopped going then they will send letter saying u r fired 😂
@@RAGHAVENDRASINGH17 that's literally what happened to me
Also how to get your home system pwned.. 3389 open to the public...😳
@starscreamm
Honestly probs a lot more secure than RDP since it's made by the OpenBSD guys (Security nuts).
If you have to leave ssh open to the public configure something like fail2ban and set up ssh keys instead of passwords.
But a good rule of thumb is to not leave any unused ports open.
@@shady4tv Another solution I favor is having no ports open on the host to begin with, openssh server listening only on the loopback, and the firewalled host initiating a reverse tunnel to a hardened bastion/jump server.
I'm subbing just because you were singing "teach me how to tunnel". I didn't think I would be laughing before the 1 minute mark.
You can't imagine how many people asks me about how to tunnel everyday. Will share it with everybody o/
ssh has made me intreinged i've been looking at different vids about it and your's was easier to understand
Great video.
Nice!
Great!!
Thanks bro
Great stuff
Your intro song is coooool! :)
Brillant video. I was able to configure the x11 "xrdp" server installed on my Raspberrypi 4 to be accessible by my work computer over Windohs RDP client. Thank you! FWIW I found that Git-scm client for windows to be awesome as a SSH and bash client on windows.
Examples of protocols that use SSH tunneling:
SFTP (Secure FTP; also uses port 22), and
SCP (Secure Copy Protocol). Actually you can tunnel virtually any transfer protocol over SSH.
awesome thank you.
great video as always! cant believe those 10 people who disliked smh .-.
as soon as I saw the seaport graphics I got nostalgic, exited the video and went browsing 90s strategy games
Well Sayid, Thx
Usefull
wow! You have just made me realized how vulnerable Internet is.
It's not actually
merci !
Thx
SSH Tunneling is great. I don't recommend doing it with a work and home PC, but if you put up your own webserver in the cloud for work or for you own personal website, it's a good way to manage it remotely and transfer files. You can also put up an SSH proxy server that only lets you connect with a certificate and key pair and then tunnel another SSH session through that proxy to the webserver that uses a different authentication method for multi-factor authentication and more than one layer of protection for it. Then you set the the webserver to only allow SSH connections in from the proxy.
Very good and clear explaination :)
You have got like you have got sub and "now we're cooking :D"
Combine reverse tunnel with “touch” of a file on some web server. If you have access to that server, you can touch the file, the machine behind variable IP and firewall queries that file ever so often and establishes the reverse tunnel only when requested. You can then ssh into that machine via reverse tunnel.
Explain
this is a pretty good explanation but it would be easier to understand if it were a bit more comprehensive in explaining which port is accessed by which device and do i need to specify a port forwarding setting on my home router...
Should talk about port security. Shutting down closed ports. Some "closed" ports aren't really closed as it says, you can still listen and establish connection.
I would highly suggest you do not try to connect to your home computer in any capacity from an enterprise network. You will set off all types of red flags. This is useful in a home setting but I consider this NSFW because you could be punished and open your company systems vulnerable.
I agree with all of that. These were just hypothetical examples to explain a point.
@@Tinkernut Thanks I love it when someone teaches dangerous things
Some folks like me use their own computers at work as well
@@Tinkernut This is to be taken as learning security and ways how security can be beaten, it will help to strengthen technical controls.
Or you could tunnel ssh through TLS on port 443 and see if they notice. If they do you should explain that this problem would be prevented if they implemented a whitelist firewall policy for outbound traffic. And then you should ask for a raise. Maybe times are different now but when I worked for the corporation they never noticed my tunnel coming from my cubicle, or noticed my need for a raise.
This is all very new to me so I’m enjoying being exposed to new information.
Awesome explanations. I liked reversed ssh the most. When doing a reverse ash to say the work computer, will it time out or stay that way long enough for you to get home and access it?
Nice job!
But I have to ask you something:
In the video where you explained how to host Wordpress on the Raspberry Pi you talked about SSH Tunneling and how it is more secure than simple port-forwarding.
Could you show how to make the website of that video aviable on the Internet with a top-level domain and SSH Tunneling (or in some other way without putting at risk your home network)?
That would be very helpful!
Alessandro Zanzi the best thing you can do is read up on how to secure your network via firewall and keep every program you have up to date with the latest patch.
mind=blown
Had to listen to Teach Me How to Dougie after this.