SSH Tunneling Explained
HTML-код
- Опубликовано: 28 май 2024
- 🎵Teach me how to tunnel, teach me, teach me how to tunnel🎵 Ever gotten frustrated because your school or your work blocks fun/entertaining sites that can help you unwind and relax therefore increasing your productivity? SSH Tunneling is a good secure way to bypass firewalls that block sites. But that's not all! Order now and we'll also toss in local and reverse port forwarding! Check out the video to figure out what the heck I'm talking about and the magic SSH Tunneling has to offer!
_____________________________
📲🔗🔗📲 IMPORTANT LINKS 📲🔗🔗📲
______________________
List of common TCP/IP ports - web.mit.edu/rhel-doc/4/RH-DOC...
Putty - www.putty.org/
Serveo - serveo.net
_____________________________
💰💰💰💰 SUPPORT THE SHOW 💰💰💰💰
______________________
www.tinkernut.com/donate
_____________________________
🤔💡🤔💡 SUBMIT YOUR IDEAS 🤔💡🤔💡
______________________
www.tinkernut.com/ideas
____________________________
📢📢📢📢 Follow 📢📢📢📢
____________________________
redd.it/5o3tp8
instagram.com/
/ tinkernut
/ tinkernut
The simplest, very best explanation and comprehensive coverage I have seen on this subject for several decades - no ever!
Thanks! That really means a lot :-)
My pleasure.
This is exactly what I thought too! The ship annimation is what did it for me. Why has it taken so long for me to see that analogy used to explain ports, duh. Why have I not seen this used before?! Why didn't I think of that already?!! Awesome, definitely using it for staff training tomorrow.
@Tinkernut
Not the tunneling ELON_MUSK boaring company does 😂😂😂😂
Best line
FANTASTIC! I live in Thailand where nobody is available to help me figure out things like this, so I do my best to learn myself by Googling to death by chasing endless rabbits down multiple deadend rabbit holes! 😵 I've been fighting locally provided routers to set up port forwarding repeatedly over the years. Crappy at best instructions available, sometimes only in Thai! NOW I see tunnelling is all I need! My GOD man, THANKS! (Donation to come!)
I like this intro to tunneling. Thank you.
One thing important to mention is that you are not "bypassing" the firewall--you are using a port allowed by the firewall to use a service (like RDP in the demo) the firewall blocks.
this seems so trivial to overlook but yet is very crucial to understand, props for making this clear to neophytes like me!
you just described a bypass.
Of course, if the firewall is blocking RDP, it's almost certainly also blocking SSH.
I love how you explain things, and the visuals that you use make it easier to understand. 👍🏻
That is a lot of information to absorb. Thank you, I will have to go through it in super slow-mo.
@Nobody Knows ohh we've got a smart guy here back off everyone
@@Synthels you are a special one aren't you
@@digantchandel4152 he deleted the comment, can't you tell?
I've read a couple of posts on ths subject, I was not satisfied wth the explanations and I kept looking. This is the final destination for me. Well done.
By far, the best explanation on ssh tunneling I've seen!
You are the coolest person making things so simple and exciting. Wish I could see you making more videos around networking!
This was great! Excellent explanation. Can't believe it took me this long to find your channel!
Just watched your video on port forwarding, your explanations are so easy to understand.
if you want to connect to your home computer from work, you have to specify an external IP address (and not internal like the did). I know you know it, but you should mention it. Also you need to enable port forwarding on your adsl router, to forward the public ip, port, to local port, local ip
Nice explanation, sir!! Really appreciate that.
i may have to rewatch this because i think my question. is answered in last comments he makes.....
Don't forget DDNS. Remember, a standard residential DSL/cable/fiber Internet connection uses a dynamic IP address (unlike SME or enterprise Internet, which always have a static IP address).
thank you. stuff like that is really confusing if youre new to a concept
Being lefthanded, it is kinda nice seeing boats and berthing explanations. thanks.
Your videos in general are pretty "Darg-an-spectacular". Another amazing explanation! [*clapping hands*]
How to get fired from work.
Easy , stopped going then they will send letter saying u r fired 😂
@@RAGHAVENDRASINGH17 that's literally what happened to me
Also how to get your home system pwned.. 3389 open to the public...😳
@starscreamm
Honestly probs a lot more secure than RDP since it's made by the OpenBSD guys (Security nuts).
If you have to leave ssh open to the public configure something like fail2ban and set up ssh keys instead of passwords.
But a good rule of thumb is to not leave any unused ports open.
@@shady4tv Another solution I favor is having no ports open on the host to begin with, openssh server listening only on the loopback, and the firewalled host initiating a reverse tunnel to a hardened bastion/jump server.
Awesome!, this has been great help to wrap my head around the final pieces of how this work (working with same things in school).
Thank you! Such a great, no BS explaination.
Cool stuff! Thanks for an educational and informative presentation!
I knew what ssh was this whole time I just never knew executing it was easy asf. U deserve my sub
The better tutorial in video about SSH Tunnel and Sockets Proxy. Thank you very much!
This is what I do with my own server used for VR work. The administration panel is on a non-standard port and the only protection is a basic username/password. To really secure it, the port is not exposed to the internet and has no username/password requirement, meaning a local connection is needed, which is what is normally tunneled.
A REALLY clever trick is to use a similar idea with say PHPMyAdmin. It has an access rule to ONLY allow the server itself to access it. This forces the entry to be from a tunneled SSH session.
Great video. Excellent instructions. Very clear. Thanks
Nice, Clear, to the point with some nerdy humor... First video i've seen from you, directly subbed... Thanks!
Thanks, I am doing my OSCP at the moment and everything, even the buffer overflows have been totally fine, but the abstractness of SSH port forwarding (reverse specifically) has me baffled! This video has helped
You make it easier to understand, thank you!
Great information to get started Thanks!
Thanks for the video. I literally only heard SSH and nothing about what it was. Im going to be using this.
I love it! And I subscribed. Best wishes Sir!
thank you sooo much for this, and for that in port forwarding Mr Tinkernut
This was a great video, thank you very much!
you are a life save, God bless you, Thankyou so much
i don't know but i really like your videos man , so clean , good job
I have no use for any of this but defiantly good to know and widened my knowledge!
bruh you deserve more recognition
Thank you for uploading such a good video and explanation of ssh tunnels
its the best explanation of ssh tunneling. Thanks a lot!
Great stuff.. ive been wondering how to tunnel outside of a secure network. Im going to try this at work when i get a chance. Ofcourse with permission!
Simple explanation...working perfectly
U r the best :) Many thx. The explanation is step by step and quite easy to understand. Well done!
Nice tips dude !
Very good explanation
Very great info!
Thanks!
this is a great explanation. Thanks, man
i JUST LOVED THIS VIDEO PLEASE DO MORE NETWORK VIDEOS
wow man, this is a really great video.
You can't imagine how many people asks me about how to tunnel everyday. Will share it with everybody o/
Thanks for this video. It answered a number of questions I've had about SSH. I'd subscribe, but I'm already a subscriber.... :-)
I like the way u teach ....keep on buddy
This video is beautiful and i want to cry, i love you dude, please keep your videos coming you are a true plus to humanity
Very well explained...thanks
Very nice explaining
Sir that's very good . Good Explanation with good Example. I loved it
I'm subbing just because you were singing "teach me how to tunnel". I didn't think I would be laughing before the 1 minute mark.
simple and extremely helpful. thx
amazing explanation with examples and animation :-)
Awesome representation
Examples of protocols that use SSH tunneling:
SFTP (Secure FTP; also uses port 22), and
SCP (Secure Copy Protocol). Actually you can tunnel virtually any transfer protocol over SSH.
This is GREAT. Thank You.
brilliant explanation
very nice explanation.
Great guide!
great, interesting and with expertise. thanks
Thank You So Much ❤
The best explanation Ever!!!!
Thank you sir, now I get it.
I love you, BRO. Your video helped.
ssh has made me intreinged i've been looking at different vids about it and your's was easier to understand
This is useful information, indeed.
Brillant video. I was able to configure the x11 "xrdp" server installed on my Raspberrypi 4 to be accessible by my work computer over Windohs RDP client. Thank you! FWIW I found that Git-scm client for windows to be awesome as a SSH and bash client on windows.
Thank you so much !!!!
as soon as I saw the seaport graphics I got nostalgic, exited the video and went browsing 90s strategy games
love your videos!!
Just awesome👍
That was great! Thanks
Good stuff champ!
Simply Awesome
You are a gem!
Great video.
Your intro song is coooool! :)
SSH Tunneling is great. I don't recommend doing it with a work and home PC, but if you put up your own webserver in the cloud for work or for you own personal website, it's a good way to manage it remotely and transfer files. You can also put up an SSH proxy server that only lets you connect with a certificate and key pair and then tunnel another SSH session through that proxy to the webserver that uses a different authentication method for multi-factor authentication and more than one layer of protection for it. Then you set the the webserver to only allow SSH connections in from the proxy.
great video as always! cant believe those 10 people who disliked smh .-.
wow! You have just made me realized how vulnerable Internet is.
It's not actually
Thanks bro
awesome thank you.
Great stuff
Well Sayid, Thx
I would highly suggest you do not try to connect to your home computer in any capacity from an enterprise network. You will set off all types of red flags. This is useful in a home setting but I consider this NSFW because you could be punished and open your company systems vulnerable.
I agree with all of that. These were just hypothetical examples to explain a point.
@@Tinkernut Thanks I love it when someone teaches dangerous things
Some folks like me use their own computers at work as well
@@Tinkernut This is to be taken as learning security and ways how security can be beaten, it will help to strengthen technical controls.
Or you could tunnel ssh through TLS on port 443 and see if they notice. If they do you should explain that this problem would be prevented if they implemented a whitelist firewall policy for outbound traffic. And then you should ask for a raise. Maybe times are different now but when I worked for the corporation they never noticed my tunnel coming from my cubicle, or noticed my need for a raise.
Awesome explanations. I liked reversed ssh the most. When doing a reverse ash to say the work computer, will it time out or stay that way long enough for you to get home and access it?
Nice!
Great!!
This is all very new to me so I’m enjoying being exposed to new information.
Should talk about port security. Shutting down closed ports. Some "closed" ports aren't really closed as it says, you can still listen and establish connection.
Very good and clear explaination :)
You have got like you have got sub and "now we're cooking :D"
me da ganas de quitarme lentamente la existencia cada vez que veo este video
ATTE Yoel Pérez Alted
Nice job!
But I have to ask you something:
In the video where you explained how to host Wordpress on the Raspberry Pi you talked about SSH Tunneling and how it is more secure than simple port-forwarding.
Could you show how to make the website of that video aviable on the Internet with a top-level domain and SSH Tunneling (or in some other way without putting at risk your home network)?
That would be very helpful!
Alessandro Zanzi the best thing you can do is read up on how to secure your network via firewall and keep every program you have up to date with the latest patch.
Very good explanation.
Just one thing I wish to ask is, if network connection is interrupted what will happen to the ssh tunnel?
Whether it has feature to reestablish automatically just as normal LAN or WiFi link?
I read about 2h about ssh tunneling today, got this suggested.. 5 mins to cover all.. gj bro! You'd have a new subscriber. but ehh.. windows is so ugly I can't stand it.
Thx
this is a pretty good explanation but it would be easier to understand if it were a bit more comprehensive in explaining which port is accessed by which device and do i need to specify a port forwarding setting on my home router...
Combine reverse tunnel with “touch” of a file on some web server. If you have access to that server, you can touch the file, the machine behind variable IP and firewall queries that file ever so often and establishes the reverse tunnel only when requested. You can then ssh into that machine via reverse tunnel.
Explain
Usefull
merci !