SSH Dynamic Port Forwarding
Overview
SSH Dynamic Port Forwarding (SOCKS Proxy) allows an attacker or administrator to route traffic dynamically through an SSH tunnel. Unlike local or remote port forwarding, which forwards traffic to a fixed destination, dynamic forwarding enables a SOCKS proxy that can route traffic to multiple destinations.
This is useful for scenarios such as:
Bypassing firewalls or network restrictions
Gaining access to internal networks from a compromised system
Tunneling tools through an SSH connection to maintain stealth
How It Works
When SSH dynamic port forwarding is enabled, SSH creates a SOCKS proxy server on the client machine. Any application that supports SOCKS5 (e.g., web browsers, proxychains) can be configured to use this proxy to forward traffic through the SSH tunnel.
Setting Up Dynamic Port Forwarding
To establish an SSH SOCKS proxy, run:
Explanation:
-D [local_port]
→ Specifies the local port to act as a SOCKS proxy (e.g., 1080)-N
→ Prevents executing commands on the remote host (used for tunneling only)-f
→ Runs SSH in the background after authentication
Example:
This will create a SOCKS proxy at 127.0.0.1:1080
, which can be used to forward traffic dynamically.
Using the SOCKS Proxy
Once the SSH tunnel is active, configure applications to use the SOCKS proxy:
1. Using ProxyChains
Modify /etc/proxychains.conf
or ~/.proxychains/proxychains.conf
to include:
Then, run:
This routes nmap
scans through the SOCKS proxy.
2. Using Firefox
Go to Settings > Network Settings
Select Manual Proxy Configuration
Set SOCKS Host to
127.0.0.1
, port1080
Check SOCKS v5
Enable Proxy DNS when using SOCKS v5
3. Using Curl
Run:
Verifying the Connection
To check if your traffic is routing through the SSH tunnel, visit:
This should return the IP of the remote SSH server instead of your local machine.
Closing the Tunnel
To terminate the SSH SOCKS proxy:
Or manually find the process and kill it:
Last updated