تا حالا شده بخواین ترمینال خودتون را شیر کنید در واقع anydesk یا teamviewer نسخه cli داشته باشین ?!!!!
با برنامه teleconsole میتونید
کافیه دستور زیر را اجرا کنید تا برنامه نصب بشه
curl https://www.teleconsole.com/get.sh | sh
سپس با اجرای برنامه teleconsole شما یک سیشن میده ، حتی میتونید تحت وب هم در لینکی که میده وصل بشیم
$ teleconsole
Requesting a disposable SSH proxy for you...
Checking status of the SSH tunnel...
Your Teleconsole ID: 4bc2b5138360d343379b9043083c48eb7084c3b8
WebUI for this session: https://teleconsole.com/s/4bc2b5138360d343379b9043083c48eb7084c3b8
برای خروج هم کافی هست exit را اجرا کنید
سورس برنامه هم بصورت آزاد موجود است
https://github.com/gravitational/teleconsole
#terminal #ssh #cli #teleconsole @unixmens
با برنامه teleconsole میتونید
کافیه دستور زیر را اجرا کنید تا برنامه نصب بشه
curl https://www.teleconsole.com/get.sh | sh
سپس با اجرای برنامه teleconsole شما یک سیشن میده ، حتی میتونید تحت وب هم در لینکی که میده وصل بشیم
$ teleconsole
Requesting a disposable SSH proxy for you...
Checking status of the SSH tunnel...
Your Teleconsole ID: 4bc2b5138360d343379b9043083c48eb7084c3b8
WebUI for this session: https://teleconsole.com/s/4bc2b5138360d343379b9043083c48eb7084c3b8
برای خروج هم کافی هست exit را اجرا کنید
سورس برنامه هم بصورت آزاد موجود است
https://github.com/gravitational/teleconsole
#terminal #ssh #cli #teleconsole @unixmens
GitHub
GitHub - gravitational/teleconsole: Command line tool to share your UNIX terminal and forward local TCP ports to people you trust.
Command line tool to share your UNIX terminal and forward local TCP ports to people you trust. - gravitational/teleconsole
Forwarded from Academy and Foundation unixmens | Your skills, Your future (yashar esmaildokht 🐧)
تا حالا شده بخواین ترمینال خودتون را شیر کنید در واقع anydesk یا teamviewer نسخه cli داشته باشین ?!!!!
با برنامه teleconsole میتونید
کافیه دستور زیر را اجرا کنید تا برنامه نصب بشه
curl https://www.teleconsole.com/get.sh | sh
سپس با اجرای برنامه teleconsole شما یک سیشن میده ، حتی میتونید تحت وب هم در لینکی که میده وصل بشیم
$ teleconsole
Requesting a disposable SSH proxy for you...
Checking status of the SSH tunnel...
Your Teleconsole ID: 4bc2b5138360d343379b9043083c48eb7084c3b8
WebUI for this session: https://teleconsole.com/s/4bc2b5138360d343379b9043083c48eb7084c3b8
برای خروج هم کافی هست exit را اجرا کنید
سورس برنامه هم بصورت آزاد موجود است
https://github.com/gravitational/teleconsole
#terminal #ssh #cli #teleconsole @unixmens
با برنامه teleconsole میتونید
کافیه دستور زیر را اجرا کنید تا برنامه نصب بشه
curl https://www.teleconsole.com/get.sh | sh
سپس با اجرای برنامه teleconsole شما یک سیشن میده ، حتی میتونید تحت وب هم در لینکی که میده وصل بشیم
$ teleconsole
Requesting a disposable SSH proxy for you...
Checking status of the SSH tunnel...
Your Teleconsole ID: 4bc2b5138360d343379b9043083c48eb7084c3b8
WebUI for this session: https://teleconsole.com/s/4bc2b5138360d343379b9043083c48eb7084c3b8
برای خروج هم کافی هست exit را اجرا کنید
سورس برنامه هم بصورت آزاد موجود است
https://github.com/gravitational/teleconsole
#terminal #ssh #cli #teleconsole @unixmens
GitHub
GitHub - gravitational/teleconsole: Command line tool to share your UNIX terminal and forward local TCP ports to people you trust.
Command line tool to share your UNIX terminal and forward local TCP ports to people you trust. - gravitational/teleconsole
Forwarded from Academy and Foundation unixmens | Your skills, Your future (yashar esmaildokht 🐧)
This media is not supported in your browser
VIEW IN TELEGRAM
SSHuttle is a transparent proxy server that works as a VPN over SSH. It allows you to create a secure connection between your local machine and a remote server, encrypting all traffic in transit. This tool is especially useful when you need to access resources or services that are restricted by firewalls or not directly accessible from your local network.
How SSHuttle Works:
- SSHuttle leverages the SSH protocol to create a secure tunnel between your local machine and a remote server.
- It redirects all network traffic through the SSH connection, effectively encrypting and proxying your data.
- SSHuttle works in a transparent mode, meaning you don't need to change network settings or configure individual applications to use the tunnel.
Use Cases:
1. Bypassing Firewalls: SSHuttle can help bypass restrictive firewalls or network restrictions by tunneling your traffic through an SSH connection to a server outside the restricted network.
2. Secure Access to Remote Resources: It provides a secure way to access resources on a remote server as if they were local to your machine, enhancing security for data transfers and remote access.
3. Anonymity and Privacy: SSHuttle encrypts your network traffic, ensuring privacy and anonymity when browsing or accessing services.
How to Use SSHuttle:
To use SSHuttle, you need SSH access to a remote server. Here's a basic usage example:
- Replace
- The
Usability:
- Easy Setup: SSHuttle is easy to set up and use, requiring minimal configuration.
- Secure Connectivity: It provides secure encrypted connectivity, ideal for accessing resources over untrusted networks.
- Transparent Operation: SSHuttle operates transparently, simplifying its usage without the need to modify network settings or individual applications.
more example :
cat ~/.ssh/config
Host *
Port 22
StrictHostKeyChecking no
UserKnownHostsFile /dev/null
ServerAliveInterval 60
ServerAliveCountMax 30
Host yashar_node1
HostName example.mydomain.com
User user1
IdentityFile ~/.ssh/id_rsa
Host yashar_node2
HostName example2.mydomain.com
User user2
IdentityFile ~/.ssh/id_rsa
To setup a vpn tunnel to route connections to our prod account:
$ sshuttle -r yashar_node2 172.31.0.0/16
Or to setup a vpn tunnel to route connections to our dev account:
$ sshuttle -r yashar_node1 172.31.0.0/16
Once one of your chosen sessions establishes, you can use a new terminal to access your private network, as example:
$ nc -vz 172.31.23.40 22
Bash Functions
We can wrap this into functions, so we can use vpn_dev or vpn_prod which aliases to the commands shown below:
$ cat ~/.functions
vpn_prod(){
sshuttle -r yashar_node2 172.31.0.0/16
}
vpn_dev(){
sshuttle -r yashar_node1 172.31.0.0/16
}
Now source that to your environment:
$ source ~/.functions
Then you should be able to use vpn_dev and vpn_prod from your terminal:
$ vpn_prod
[local sudo] Password:
Warning: Permanently added 'xx,xx' (ECDSA) to the list of known hosts.
client: Connected.
And in a new terminal we can connect to a RDS MySQL Database sitting in a private network:
$ mysql -h yashar_node2 -u dbadmin -p$pass
mysql>
Overall, SSHuttle is a handy tool for creating secure VPN-like connections over SSH, offering convenience, security, and flexibility for accessing remote resources or bypassing network restrictions.
#ssh #linux #net #network #security
https://t.me/unixmens
How SSHuttle Works:
- SSHuttle leverages the SSH protocol to create a secure tunnel between your local machine and a remote server.
- It redirects all network traffic through the SSH connection, effectively encrypting and proxying your data.
- SSHuttle works in a transparent mode, meaning you don't need to change network settings or configure individual applications to use the tunnel.
Use Cases:
1. Bypassing Firewalls: SSHuttle can help bypass restrictive firewalls or network restrictions by tunneling your traffic through an SSH connection to a server outside the restricted network.
2. Secure Access to Remote Resources: It provides a secure way to access resources on a remote server as if they were local to your machine, enhancing security for data transfers and remote access.
3. Anonymity and Privacy: SSHuttle encrypts your network traffic, ensuring privacy and anonymity when browsing or accessing services.
How to Use SSHuttle:
To use SSHuttle, you need SSH access to a remote server. Here's a basic usage example:
sshuttle -r username@ssh_server 0/0
sshuttle --dns -r root@ip 0.0.0.0/0
- Replace
username
with your remote server username and ssh_server
with the SSH server address.- The
0/0
parameter indicates that all network traffic should be tunneled through the SSH connection.Usability:
- Easy Setup: SSHuttle is easy to set up and use, requiring minimal configuration.
- Secure Connectivity: It provides secure encrypted connectivity, ideal for accessing resources over untrusted networks.
- Transparent Operation: SSHuttle operates transparently, simplifying its usage without the need to modify network settings or individual applications.
more example :
cat ~/.ssh/config
Host *
Port 22
StrictHostKeyChecking no
UserKnownHostsFile /dev/null
ServerAliveInterval 60
ServerAliveCountMax 30
Host yashar_node1
HostName example.mydomain.com
User user1
IdentityFile ~/.ssh/id_rsa
Host yashar_node2
HostName example2.mydomain.com
User user2
IdentityFile ~/.ssh/id_rsa
To setup a vpn tunnel to route connections to our prod account:
$ sshuttle -r yashar_node2 172.31.0.0/16
Or to setup a vpn tunnel to route connections to our dev account:
$ sshuttle -r yashar_node1 172.31.0.0/16
Once one of your chosen sessions establishes, you can use a new terminal to access your private network, as example:
$ nc -vz 172.31.23.40 22
Bash Functions
We can wrap this into functions, so we can use vpn_dev or vpn_prod which aliases to the commands shown below:
$ cat ~/.functions
vpn_prod(){
sshuttle -r yashar_node2 172.31.0.0/16
}
vpn_dev(){
sshuttle -r yashar_node1 172.31.0.0/16
}
Now source that to your environment:
$ source ~/.functions
Then you should be able to use vpn_dev and vpn_prod from your terminal:
$ vpn_prod
[local sudo] Password:
Warning: Permanently added 'xx,xx' (ECDSA) to the list of known hosts.
client: Connected.
And in a new terminal we can connect to a RDS MySQL Database sitting in a private network:
$ mysql -h yashar_node2 -u dbadmin -p$pass
mysql>
Overall, SSHuttle is a handy tool for creating secure VPN-like connections over SSH, offering convenience, security, and flexibility for accessing remote resources or bypassing network restrictions.
#ssh #linux #net #network #security
https://t.me/unixmens
❤2👍2
https://www.qualys.com/regresshion-cve-2024-6387/
در واقع CVE-2024-6387، یک اجرای کد از راه دور با درجه بالا میباشد که در سرور OpenSSH (sshd) است که دسترسی ریشه کامل را اعطا می کند. این یک ریسک بهره برداری قابل توجه دارد .
#security #ssh #cve #hack
@unixmens
در واقع CVE-2024-6387، یک اجرای کد از راه دور با درجه بالا میباشد که در سرور OpenSSH (sshd) است که دسترسی ریشه کامل را اعطا می کند. این یک ریسک بهره برداری قابل توجه دارد .
#security #ssh #cve #hack
@unixmens
Qualys
OpenSSH Vulnerability: CVE-2024-6387 FAQs and Resources | Qualys
Get to know about CVE-2024-6387, the OpenSSH vulnerability, and explore its FAQs on Regresshion for detailed insights and updates. Read More!