Useful Commands/Security: Difference between revisions

From Fundamental Ramen
Jump to navigation Jump to search
No edit summary
Line 1: Line 1:
{| class="wikitable"
{| class="wikitable"
! 情境 || 指令
! TODO || Command
|-
|-
| Indirect outgoing for PostgreSQL ||
| Indirect outgoing for PostgreSQL ||
Line 84: Line 84:
</source>
</source>
|}
|}
= Forward DNS service =
<quickgv name="ncflow" theme="warm">
rankdir=TB;
CLIENT [label="DNS request\n$ nslookup www.facebook.com localhost"];
SS [label="UDP Service LISTEN *:53\n$ nc -u -l 53 > outgoing.fifo < incoming.fifo"];
SOCK [label="UDP Connection 192.168.1.1:53\n$ nc -u 192.168.1.1 53 > incoming.fifo < outgoing.fifo"];
DNS [label="DNS Server"];
OF [label="outgoing.fifo"];
IF [label="incoming.fifo"];
CLIENT -> SS [label="1"];
SS -> OF [label="2"];
OF -> SOCK [label="3"];
SOCK -> DNS [label="4"];
DNS -> SOCK [label="5"];
SOCK -> IF [label="6"];
IF -> SS [label="7"];
SS -> CLIENT [label="8"];
</quickgv>


= Share DNS and SOCKS Proxy =
= Share DNS and SOCKS Proxy =
Line 108: Line 130:
sudo nc -u -l 53 < /tmp/dns-incoming | nc localhost 10053 /tmp/dns-incoming &
sudo nc -u -l 53 < /tmp/dns-incoming | nc localhost 10053 /tmp/dns-incoming &
</source>
</source>
<quickgv name="ncflow" theme="warm">
rankdir=TB;
CLIENT [label="DNS request\n$ nslookup www.facebook.com localhost"];
SS [label="UDP Service LISTEN *:53\n$ nc -u -l 53 > outgoing.fifo < incoming.fifo"];
SOCK [label="UDP Connection 192.168.1.1:53\n$ nc -u 192.168.1.1 53 > incoming.fifo < outgoing.fifo"];
DNS [label="DNS Server"];
OF [label="outgoing.fifo"];
IF [label="incoming.fifo"];
CLIENT -> SS [label="1"];
SS -> OF [label="2"];
OF -> SOCK [label="3"];
SOCK -> DNS [label="4"];
DNS -> SOCK [label="5"];
SOCK -> IF [label="6"];
IF -> SS [label="7"];
SS -> CLIENT [label="8"];
</quickgv>

Revision as of 02:43, 22 February 2019

TODO Command
Indirect outgoing for PostgreSQL
# [Private]
# localhost -> localhost:15432
#           -> server:22
#           -> somewhere.com:5432
ssh -NCfL 15432:somewhere.com:5432 server

# [Shared]
# any -> *:15432
#     -> server:22
#     -> somewhere.com:5432
ssh -NCfL *:15432:somewhere.com:5432 server
Indirect outgoing for Web
# [Private]
# localhost -> localhost:3128
#     -> server:22
#     -> *:*
ssh -NCfD localhost:3128 server

# [Shared]
# any -> *:3128
#     -> server:22
#     -> *:*
ssh -NCfD *:3128 server
Share MariaDB in LAN
# Step 1: Listen (Run at LAN)
# Listen server:13306 -> server:22
#                     -> localhost:3306
ssh -NCfR 13306:localhost:3306 server

# Step 2: Share (Run at Home/WAN)
# any -> server:3306
#     -> server:13306
#     -> server:22
#     -> localhost:3306
ssh -NCfL *:3306:localhost:13306 localhost
List tunnels
# List full commands.
ps ax | awk '/ssh \-NCf/ { print $0 }'

# List settings.
ps ax | awk '/ssh \-NCf/ { print $7 }'

# List pids.
ps ax | awk '/ssh \-NCf/ { print $1 }'

# Kill all tunnels.
kill $(ps ax | awk '/ssh \-NCf/ { print $1 }')
Generate key pair
# Save as default name id_rsa, id_rsa.pub
ssh-keygen
# Save as thefuck, thefuck.pub without password
ssh-keygen -f abc -N ''
# Save as thefuck, thefuck.pub with password 
ssh-keygen -f abc -N '12345'
Generate public key from private key
# Dump
ssh-keygen -yf thefuck.pem
# Save as file
ssh-keygen -yf thefuck.pem > thefuck.pub
# Save as authorized_keys (while ~/.ssh/authorized_keys didn't exist)
ssh-keygen -yf thefuck.pem > authorized_keys
# Append into authorized_keys
ssh-keygen -yf thefuck.pem >> authorized_keys

Forward DNS service

Share DNS and SOCKS Proxy

Share SOCKS Proxy

# Step 1:
ssh -NCfD 3128 localhost

# Step 2:
ssh -NCfR 13128:localhost:3128 server

# Step 3:
ssh -NCfL *:3128:localhost:13128 localhost

Share DNS

See: Performing UDP tunneling through an SSH connection

mkfifo /tmp/dns-incoming
nc -l 10053 < /tmp/dns-incoming | nc -u 192.168.1.1 53 > /tmp/dns-incoming &
ssh -NCfR 10053:localhost:10053 server

mkfifo /tmp/dns-incoming
sudo nc -u -l 53 < /tmp/dns-incoming | nc localhost 10053 /tmp/dns-incoming &