SSH Tunneling & Secure Browsing: Part III

2017-03-16T22:55:43+00:00Categories: How To's|Tags: , |

This time I will go over setting up SSH client in Linux, setting up key pairs and how to implement keys for authentication in Linux. Setting up tunneling in Linux is as easy as typing in: ssh -D 8080[:] [email protected][:port] example: ssh -D 8080 [email protected]:443 In the above example my server is listening for SSH requests on port 443 instead of [...]

SSH Tunneling & Secure Browsing: Part II

2017-04-17T15:34:57+00:00Categories: How To's|Tags: , |

If you have completed Part I, you should have a running SSH server ready to tunnel all your needs. If you are on a PC running Microsoft’s Windows operating system like me, download PuTTY 0.62-installer.exe from and install it. PuTTY will be our SSH client and we are going to cover: Password Authentication Asymmetric Key based authentication (RSA) The [...]

SSH Tunneling & Secure Browsing: Part I

2017-03-16T22:58:12+00:00Categories: How To's|Tags: , |

Checking your Facebook page from Starbucks? Checked your banking information from the Hotel WiFi? Or are you going to Defcon this year?  Public internet is not secure and there is a need for secure browsing. There are many ways to achieve this and Obfuscate the traffic for eavesdroppers and protect ourselves against Man In The Middle (MITM) attack. After trying a [...]

Come by our booth March 18 & 19, 2019 at BSides Vancouver, a two-day, high-caliber gathering for information security professionals, hackers, coders and the greater tech community. link to