![]() ![]() □ I’ve provided basic installation instructions for FreeSSHd below: However, make sure you have the most recent version, because the older ones have a few security issues. You can just as easily use some other Linux SSH server like OpenSSH (included in Backtrack, though you may have to enable it), but this blog is tuned for Windows users so I’ll be showing how to install and configured FreeSSHd. ![]() If you have any questions or comments feel free to contact me. Note: I realize this would be easier to understand if their was an image, but I got a little lazy. Access Tunneled RDP Session on Local Port via RDP Client.Run Plink.exe on the Remote Server (compromised server).Upload Plink.exe to the Remote Server (compromised server).Add Registry Key to Remote Server (compromised server) with Reg.Test the FreeSSHd Configuration with PuTTY.Create the Key Pair for each User with PutTTYgen.Configure Tunneling Options in FreeSSHd.This blog should be useful to penetration testers, admins, and any home users looking for a pseudo VPN solution. The methods outlined can also be used to tunnel other protocols over SSH connections in order traverse firewalls, but I thought RDP was one that people could use in many scenarios. I’ll also show how to do it without having to accept SSH server keys interactively, which can come in handy when pentesting. In this blog I’ll be providing instructions for establishing an RDP connection over a reverse SSH tunnel using plink.exe and FreeSSHd. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |