If you have completed Part I, you should have a running SSH server ready to tunnel all your needs. If you are on a PC running Microsoft’s Windows operating system like me, download PuTTY 0.62-installer.exe from http://the.earth.li/~sgtatham/putty/latest/x86/putty-0.62-installer.exe and install it.
PuTTY will be our SSH client and we are going to cover:

  1. Password Authentication
  2. Asymmetric Key based authentication (RSA)

The second method being the most secure if implemented properly.
Once Putty is installed it should have created an icon on your desktop. Open Putty and you will see the screen below:

Default Putty window

 

Fill up the fields as necessary
Host Name: [username]@[server name]|[IP address]
Port: The default port is 22 ***
Connection type: SSH
Saved Sessions: [Any name of your liking]

Once this information is filled in click on “Connection” > expand “SSH” > “Tunnels” and fill the tunnel information.

Tunnel Configuration

 

Click Add when done. On the menu to the left scroll all the way up and click “Session” and then click “Save” to save changes to the configuration. Click “Open” to launch the connection PuTTY will prompt that the Key is not recognized if this is the first time you are connecting. Click Yes to save the key in registry. I will go over key verification in another post. You will be prompted for your password at this stage. Please type it to complete the process.
Once in open your browser of choice change the Proxy settings to SOCKSv5 Server / IP = 127.0.0.1, Port: 8090 and you will be tunneling traffic like 1337.

Part III will cover setting up SSH client in Linux, Public / Private key based encryption in Linux and Windows. Hope you enjoyed, please comment below.