Skip to main content

All Questions

Tagged with
0 votes
0 answers
56 views

How do I create a limited user that can only do SSH port forwarding?

I need to create a user on my server that is restricted to only performing SSH port forwarding. This user should not have any other capabilities, such as reading files or executing commands. The ...
HappyFace's user avatar
  • 161
0 votes
1 answer
2k views

SSH Tunnel Through Multiple Hosts to Forward Traffic to Device

I am attempting to minimize my Public facing attack surface. Allowing only traffic from a specific IP address. I want to prevent all input access to the remote WAN/Edge Router's management port from ...
hackerkatt's user avatar
1 vote
1 answer
770 views

How can I securely create an autossh tunnel from an untrusted server to a trusted server?

Suppose you have a semi-trusted machine (e.g. one where your business partner's IT department has root access to) sitting behind a firewall and you want to connect to this machine from one of your ...
Mischa's user avatar
  • 183
1 vote
1 answer
431 views

MySQL through SSH Tunnel

I have a php web application (Server A) that accesses MySQL on a remote server (Server B) through an SSH tunnel. Once the tunnel is set up, I can log in and run queries on Server B from Server A ...
jonnys's user avatar
  • 11
0 votes
3 answers
5k views

Security advantages of a SSH jumphost / jumpserver

I want to learn more about hardening Webservers and currently stopped on the topic Jumphost. So for me it seems like a Jumphost for example is connected to a webserver via VPN and the only server who ...
frankhammer's user avatar
0 votes
0 answers
142 views

SSH Server Connection over VPN

I connect my VPS over SSH terminal via ssh keys stored in my computer, password login is disabled. But sometimes I need to surf web behind VPN service which changes public IP for my home computer. ...
John Sewell's user avatar
-1 votes
2 answers
271 views

set up secure connection over SSH [closed]

I'm setting up a server application which requires to establish a secure connection over SSH2, e.g. a client must open SSH2 connection to the server to reach specific application: % ssh -s -p5000 my....
Mark's user avatar
  • 269
0 votes
1 answer
527 views

Weak points of ssh tunnel and x11 server, hack investigation

So, today I've been hacked. It's very puzzling to me how it was done, so I'm looking for experienced people to show weak points in design of my systems. I have two servers. One is VPS with ...
artyomboyko's user avatar
0 votes
2 answers
939 views

Should I use openVPN or something Else?

I'm in charge of setting up a "walled network" set of servers for a group of employees, but I have no clue where to start. Posted below are the initial requirements, my line of thoughts, and my ...
T. Thomas's user avatar
  • 187
3 votes
2 answers
10k views

Windows Jump Host

A Jump Host is a special purpose computer on a network typically used to manage devices in a separate DMZ. So, I'm looking for the proper way to implement this for a target running on Windows. I was ...
mate64's user avatar
  • 1,691
0 votes
2 answers
2k views

tunneling VNC port and port forwording

I have two machine say A and B. machine A is a public gateway. machine B is in my network and running VNC server on port 6000. I want people should connect on machine A on VNC port say 5900 (unsecured)...
nikhil's user avatar
  • 1
-1 votes
1 answer
174 views

how to set up ssh tunnel to acces administartion space [closed]

My administration space is accessible via a specific port (4848) and I want to block this port to increse security . I have already disabled remote access to my database too and acces it via ssh ...
isoman's user avatar
  • 203
0 votes
1 answer
560 views

Is it possible to block specific outbound hostnames for SSH SOCKS users?

Is it possible to block connections to specific hostnames for users accessing the web via an SSH SOCKS proxy?
Tyler's user avatar
  • 77
1 vote
2 answers
844 views

Most secure settings for user dedicated for SSH Tunnel

Due to security reasons, I have created a user on my remote VPS only to use it for SSH tunneling. My local PC goes in hands of many others which scares me because I need to leave that SSH session open....
user avatar
1 vote
1 answer
224 views

SSH tunnel: can remote system take control of my PC?

that's the simple scenario: from pc A i open a tunnel SSH to a pc B. Can someone, on pc B, use this tunnel to enter or forwarding some protocol to pc A? Can i limit traffic to be generated only from ...
John's user avatar
  • 23

15 30 50 per page