Online Book Reader

Home Category

2600 Magazine_ The Hacker Quarterly - Digital Edition - Summer 2011 - 2600 Magazine [61]

By Root 485 0
trivial for an attacker to collect all the packets and look through them. You can use tools like aircrack-ng, wireshark, and FireSheep to do this. If you set Firefox to send all traffic through your SSH tunnel, people can still try to monitor what you're doing, but all they'll see is a bunch of encrypted SSH traffic. No one will be able to sniff your traffic or hijack your sessions. They can even man-in-the-middle you if they want - it doesn't matter, they can't see what you're doing. They can even be sneaky and use tools like sslsniff to trick you out of using HTTPS, but it won't work.

Starting an SSH tunnel creates a local SOCKS5 proxy server, which means you can use several applications that support proxy servers, not just Firefox. You want to connect to your instant messaging server without people stealing your password? Pidgin and Adium support SOCKS5 proxies - check out your account settings. This works with most any email client, most any web browser, most any IRC client, and really most things that you do on the Internet. If you tunnel it all through SSH, eavesdroppers and attackers can't see what you're doing. (Also, people in IRC can't tell what your home IP address is.)

Getting Around Internet Censorship

A lot of networks block access to specific websites, like schools and particularly fascist businesses. A lot of governments have countrywide Internet censorship, like China, Australia, and, if the movie and music industries get their way, the United States and all of the countries in the European Union. If you're in this situation, you just need to connect to an SSH server outside of your censorship zone and tunnel your traffic through that. That's it.

So if you're in school and they won't let you connect to Facebook, tunnel your traffic through any random web host, and you can access Facebook through the tunnel. If you're in China and you can't look up information about Tibet, tunnel your traffic through the United States.

It's quite simple, and since it uses SSH instead of other plain text proxy servers, no one will be able to know what you're doing.

Infinite Megavideo Without Paying

If you've ever tried watching streaming pirated TV on the Internet (come on, we all have), you've probably noticed that most of the shows are hosted on random video hosting sites, and the most popular is megavideo.com. If you're watching a Buffy the Vampire Slayer marathon, you'll quickly notice that after 72 minutes (into S01E02), you get this error: "You have watched 72 minutes of video today. Please wait 54 minutes or click here to enjoy unlimited use of Megavideo." Annoying, right?

What it actually means is "your IP address has watched 72 minutes of video today." As soon as you get this error, you can right-click on FoxyProxy and switch from "Default" to "ssh tunnel" (thus switching to a different IP address) and refresh the page. This time, instead of coming from your home IP, you're coming from myserver's IP. Megavideo thinks you're a different user and you can continue watching without a problem. Until, of course, myserver has watched for 72 minutes. Then you can switch back to "Default" again, since it's been over 54 minutes.

Unlimited HTTPS With PdaNet Trial

PdaNet is an awesome smartphone Internet tethering app that lets you use your phone's data plan on your computer. You install the app on your smartphone, install another program on your computer, plug your phone in, and start the app. You can then connect to the Internet through your phone instead of with your wireless card. I've only used it on my Android phone, but there are versions of PdaNet available for iPhone, Blackberry, and Windows Mobile.

It comes with a free 30-day trial. It still works after that, but it blocks HTTPS websites. By default, SSH uses port 22, HTTP uses port 80, HTTPS uses port 443, etc. Technically, rather than blocking HTTPS, PdaNet actually just blocks all traffic going out on port 443.

But if you use an SSH tunnel, you'll be accessing port 80, 443, and possibly others, but only exiting your computer through port 22.

Return Main Page Previous Page Next Page

®Online Book Reader