Changes

Jump to: navigation, search

OPS235 Lab 7 - CentOS7

741 bytes added, 11:05, 23 July 2015
no edit summary
== Part 1: How do you use ssh to tunnel other traffic. ==
[[Image:Tunnel.png|thumb|right|600px|You can also use an ssh connection to '''tunnel other types of traffic'''. There could be different reasons for doing this. For example tunneling traffic for an unencrypted application/protocol through ssh can '''increase the security of that application''' (i.e. deceive potential hackers).<br><br>Alternatively you could use it to '''circumvent a firewall that is blocking traffic''' you wish to use but allows ssh traffic to pass through.]]
 
To help harden (protect a server from attack or "penetration"), system or security administrators have the ability to "trick" or "mislead" a potential hacker in order to prevent system penetration.
 
In this part, you will learn to use a combination of SSH server configuration and iptables rules to redirect the SSH port to allow secure data traffic via another port (as opposed to the default port: 22), and use iptables to reject (better log) incoming tcp traffic via the default port.
 
What is the result of this?
Simple. Permit the SSH service for the organization, and yet trick and confound the potential hacker into thinking that ssh traffic is used on a port that is no longer available (but they may not know this!)
 
Sneaky! >;)
 
 
# For this section, you will still be using your '''centos1''' and '''centos2''' VMs.
# We will be bypassing a firewall that blocks http traffic.
13,420
edits

Navigation menu