![]() ![]() Enter the desired login and authentication information (password or key).Ĭreate the Key Pair for Each User with PuTTYgen.Ensure that the boxes next to “Allow local port forwarding” and “Allow remote port forwarding” are checked.Set the “Password authentication” and “Public key authentication” options to “Allowed” by choosing the associated radio buttons.This step really only applies if you’re planning to use public/private key pairs to authenticate to the server instead of a password. Set the “Public key folder” to the file system location where you store your public keys.Left-click the FreeSSHd taskbar icon to view the settings.So below I’ve provided the basic instrucitons: Next, we want to make sure that our SSH server is configured to actually support tunneling. The icon will appear on the Windows taskbar.Double-click the FreeSSHd icon on the desktop. ![]() Unless, of course that’s what your looking for. However, I recommend not running it as a service. □ I’ve provided basic installation instructions for FreeSSHd below: However, make sure you have the most recent version, because the older ones have a few security issues. You can just as easily use some other Linux SSH server like OpenSSH (included in Backtrack, though you may have to enable it), but this blog is tuned for Windows users so I’ll be showing how to install and configured FreeSSHd. If you have any questions or comments feel free to contact me. Note: I realize this would be easier to understand if their was an image, but I got a little lazy. Access Tunneled RDP Session on Local Port via RDP Client.Run Plink.exe on the Remote Server (compromised server).Upload Plink.exe to the Remote Server (compromised server).Add Registry Key to Remote Server (compromised server) with Reg.Test the FreeSSHd Configuration with PuTTY.Create the Key Pair for each User with PutTTYgen.Configure Tunneling Options in FreeSSHd.This blog should be useful to penetration testers, admins, and any home users looking for a pseudo VPN solution. The methods outlined can also be used to tunnel other protocols over SSH connections in order traverse firewalls, but I thought RDP was one that people could use in many scenarios. I’ll also show how to do it without having to accept SSH server keys interactively, which can come in handy when pentesting. In this blog I’ll be providing instructions for establishing an RDP connection over a reverse SSH tunnel using plink.exe and FreeSSHd.
0 Comments
Leave a Reply. |