Tagged articles
36 articles
Page 1 of 1
Liangxu Linux
Liangxu Linux
Sep 28, 2024 · Information Security

How to Set Up a Reverse SSH Tunnel to Reach Machines Behind Firewalls

This guide explains the concept of reverse SSH, why it is needed to access servers behind restrictive firewalls, and provides step‑by‑step commands and configuration tips—including port forwarding with the -R option and recommended sshd settings—to establish a reliable reverse tunnel.

LinuxReverse TunnelSSH
0 likes · 6 min read
How to Set Up a Reverse SSH Tunnel to Reach Machines Behind Firewalls
Liangxu Linux
Liangxu Linux
Apr 23, 2024 · Information Security

Mastering Internal Network Tunneling: frp, reGeorg, SSH & Earthworm Techniques

Learn how to bypass internal network restrictions during penetration testing by using frp port forwarding, reGeorg with Proxifier, SSH dynamic tunnels, and Earthworm/Ew tools, complete with step‑by‑step commands, configuration files, and practical examples for establishing reliable internal proxies.

SSHfrpnetwork tunneling
0 likes · 11 min read
Mastering Internal Network Tunneling: frp, reGeorg, SSH & Earthworm Techniques
Liangxu Linux
Liangxu Linux
May 27, 2023 · Information Security

10 Essential Methods to Secure SSH Connections on Linux

This guide presents ten practical techniques for establishing secure SSH connections on Linux, covering password authentication, key‑based login, tunnels, SCP/SFTP file transfers, SSH agent, keychain, SOCKS proxy, remote desktop, and port forwarding, each with command examples and usage notes.

LinuxSFTPSSH
0 likes · 5 min read
10 Essential Methods to Secure SSH Connections on Linux
Liangxu Linux
Liangxu Linux
Apr 2, 2023 · Fundamentals

How NAT and NAPT Translate Private IPs and Enable Intranet Penetration

This article explains why home networks use private 192.168.x.x addresses, how NAT devices translate private IPs to a single public IP, the detailed SNAT/DNAT processes, the role of ports in NAPT, and how these mechanisms enable inbound connections through techniques like NAT hole punching and intranet penetration.

IP translationNAPTNAT
0 likes · 15 min read
How NAT and NAPT Translate Private IPs and Enable Intranet Penetration
Open Source Linux
Open Source Linux
Nov 3, 2022 · Fundamentals

How to Set Up Port Forwarding for Remote Access: A Step-by-Step Guide

This guide explains what port forwarding (port mapping) is, why it’s useful for remote access, and provides detailed instructions on configuring it on a router, using public IP or dynamic DNS, plus common troubleshooting tips to ensure external users can reach internal services.

NATRemote accessRouter configuration
0 likes · 7 min read
How to Set Up Port Forwarding for Remote Access: A Step-by-Step Guide
Liangxu Linux
Liangxu Linux
May 22, 2022 · Information Security

Master firewalld: Zones, Services, Ports, Rich Rules & Direct Rules on Linux

This guide walks you through configuring firewalld on Linux, covering zones, temporary and permanent settings, service and port management, zone manipulation, rich rule creation, direct rule usage, and essential commands for enabling, disabling, and querying the firewall.

firewallfirewalldinformation security
0 likes · 15 min read
Master firewalld: Zones, Services, Ports, Rich Rules & Direct Rules on Linux
Liangxu Linux
Liangxu Linux
Oct 8, 2021 · Operations

Step‑by‑Step Guide to Server Port Proxy on Windows and Linux

This tutorial explains how to configure port forwarding on Windows using netsh and on Linux using iptables, demonstrates a multi‑machine experiment with a dual‑NIC host, and provides both temporary and permanent configuration commands for real‑world network isolation scenarios.

LinuxServer ConfigurationWindows
0 likes · 8 min read
Step‑by‑Step Guide to Server Port Proxy on Windows and Linux
Top Architect
Top Architect
May 5, 2021 · Operations

Using autossh for Secure SSH Tunneling, Automatic Reconnection, and Port Forwarding

This article explains how autossh automates SSH connections, provides reliable automatic reconnection, and supports local, remote, and dynamic port forwarding on Linux systems, including installation methods, key command‑line options, example usages, service configuration for auto‑start, and scripting tips.

SSH tunnelingSystem Administrationautossh
0 likes · 9 min read
Using autossh for Secure SSH Tunneling, Automatic Reconnection, and Port Forwarding
Liangxu Linux
Liangxu Linux
May 2, 2021 · Operations

Mastering Autossh: Secure Automatic SSH Tunnels and Port Forwarding

This guide explains how autossh automates SSH connections, provides reliable reverse and dynamic port forwarding, details installation steps, command‑line options, practical examples, and system‑level startup configuration for robust network tunneling.

SSH tunnelingautosshnetwork automation
0 likes · 8 min read
Mastering Autossh: Secure Automatic SSH Tunnels and Port Forwarding
MaGe Linux Operations
MaGe Linux Operations
Apr 7, 2021 · Operations

Master Secure SSH Tunneling with Autossh: A Complete Guide

This article explains how autossh automates secure SSH tunneling, covering its background, installation, command options, practical examples of local, remote, and dynamic port forwarding, and how to configure it for automatic startup on Linux systems.

SSH tunnelingautosshnetwork automation
0 likes · 8 min read
Master Secure SSH Tunneling with Autossh: A Complete Guide
ITPUB
ITPUB
Dec 14, 2020 · Information Security

Master SSH: Remote Login, Port Forwarding, and Secure Tunneling Explained

This guide introduces SSH, explains its encryption-based login mechanism, demonstrates common commands for remote access, local and remote port forwarding, dynamic tunneling, and highlights security risks such as man‑in‑the‑middle attacks, providing practical examples for Linux environments.

LinuxRemote LoginSSH
0 likes · 13 min read
Master SSH: Remote Login, Port Forwarding, and Secure Tunneling Explained
Top Architect
Top Architect
Dec 1, 2020 · Information Security

SSH Overview: Concepts, Basic Commands, Port Forwarding, and Remote Operations

This article introduces SSH, explains its encryption-based login mechanism, demonstrates basic command syntax, shows practical examples of remote login, local/remote/dynamic port forwarding, remote command execution, and discusses common security concerns such as man‑in‑the‑middle attacks.

LinuxRemote LoginSSH
0 likes · 13 min read
SSH Overview: Concepts, Basic Commands, Port Forwarding, and Remote Operations
MaGe Linux Operations
MaGe Linux Operations
Nov 24, 2020 · Information Security

Master SSH: Remote Login, Port Forwarding, and Secure Operations

This article introduces SSH, explains its encryption-based login mechanism, demonstrates basic commands for remote access, details port forwarding (local, remote, dynamic) with practical examples, and discusses common security concerns such as man‑in‑the‑middle attacks.

LinuxRemote LoginSSH
0 likes · 15 min read
Master SSH: Remote Login, Port Forwarding, and Secure Operations
360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
Jul 29, 2020 · Information Security

Master SSH: From Basics to Advanced Port Forwarding and Remote Operations

This article introduces SSH, explains its encryption fundamentals, demonstrates basic usage, remote login, various port forwarding techniques, and remote command execution, while also covering common pitfalls and security considerations, providing step‑by‑step examples and practical commands for Linux environments.

LinuxRemote accessSSH
0 likes · 13 min read
Master SSH: From Basics to Advanced Port Forwarding and Remote Operations