Pin It

How To Bypass A Firewall With SSH Tunneling

Bypass firewall with SSH Tunneling
As we know that Firewall is a basic component for securing a network.The basic purpose of a firewall is to isolate one network from another. Firewalls are becoming available as appliances, meaning they are installed in to the network between two networks.The Hackers often bypass Antiviruses and Anti-spywares by some methods Like Crypting,Hexing, File-pumping etc,but it becomes very difficult for a Hacker to bypass a Firewall so this article will explain on what methods do Hackers use to bypass/Hack firewalls

Firewall is often called Hindrance(Obstacle) in Hacking,the following chart will show you the working of the firewall.
The method which most Hackers use to bypass firewall is known as SSH tunneling.

What is SSH Tunneling?

Well according to wikipedia  A Secure Shell (SSH) tunnel consists of an encrypted tunnel created through an SSH protocol connection. Users may set up SSH tunnels to tunnel unencrypted traffic over a network through an encrypted channel

Why do you want to Bypass firewall?

Most network administrators at work, university or school deny access to file sharing, instant messaging or social networks such as facebook or myspace with a firewall or proxy server. If you are constantly getting a message saying "Can't connect" or something similar, the service you are trying to connect to has probably been blocked by your network administrator.

SSH Tunneling Demonstration:

Now i will demonstrate you on How to Bypass/Hack firewall using SSH Tunneling

1.The first thing you need to do is to set up an account for SSH access,There are many paid and free SSH providers listed in DMOZ directory,e.g

2.Next you need to download PUTTY.Putty is an open source SSH client.

Bypass firewall with SSH Tunneling

3.Once you have downloaded it execute it and you will be sent to the configuration page.

4.You will enter in the host name the server through which we can connect SSH access with,make sure SSH is selected using port 22.

5.Now goto Tunnels in SSH options,Here we will set up a Tunnel

6.Change Source port to 8080 and click Dynamic.

7.Once this is Done Click open.
Bypass firewall with SSH Tunneling

8.Now login in with your information you provided in the SSH Provider

9.Now you have successfully established the tunnel.

10.Now Download WireShark  and execute wireshark.

11.Now start Packet capture,it will be empty and now visit from your browser you will see packets getting captured
Bypass firewall with SSH Tunneling

12.Now we will configure Mozilla firefox to use SSH connection.

13.Go to the "Tools" menu and then "Options
Bypass firewall with SSH Tunneling

14.Go to the "Advanced" button, the "Network" tab, and then click "Settings
Bypass firewall with SSH Tunneling

15.In the connection settings enter "localhost" as the "Socks Host and your port number, such as "1080" into the "Port:" field

Bypass firewall with SSH Tunneling

Now we will go back to wire shark you will see bunch of SSH connection,as you can see we no longer have information what was being sent from server to client

Newbie's will find it very difficult to do it,lots of people were complaining me that you are only posting content for newbie's what for Intermediate so this article is for all of those guys,

Notice:Please do not copy this article is you copy it kindly provide a link back to this article.Licensed under Creative common licenses

Subscribe to our Newsletter and receive updates directly via email - Get Ethical hacking and security tips directly to your inbox. Alternatively you can Join our Hackers Community on Facebook , Google+ and Twitter .

At RHA Infosec we provide different types of Security Testing from small business sites to Corporate Sites. Click Here to know more about our complete list of services.

Subscribe to RHA

Enjoyed this article?
Subscribe to "Rafay Hacking Articles" and get daily updates in your inbox for free!


Kindly Bookmark it and Share it with Friends:

20 comments : on May 19, 2010 at 7:05 AM said...

Nice Articels

Rafay Baloch on May 20, 2010 at 1:34 AM said...

@Security insurace
Thanks for your Feedback

Shazia Tariq on June 23, 2010 at 7:38 AM said...

Hi Sir/Madam
I really appreciate you for all the valuable information that you are providing us through your blog.

Rafay Baloch on June 23, 2010 at 8:13 AM said...

@Shazia Tariq
Thanks for your comment

Anonymous said...

hello sir, i'm greenosaur

then whats the difference between SSH Tunneling with anonymous proxy ip thats provided by some sites??? which way that have more advanced?

i'm sorry if my english language is bad

dhaval on January 5, 2011 at 1:14 AM said...

hello sir!!!
i have few quastion for u!!
if i'm hacker ... i will try to hack my college server...!!
1st i hack my frends pc then connect college server...
in that condition ..
1)what is see my frends pc screen???
2)college administretor can trace me???
3)for by-pass way in hacking i have been alredy many ip's?? & also that ip's work other in chain connection my one friend shutdown thire pc my connection is broken...what i do in that condition!!!
reply must!!! i'm new in that field... & also sorry about my bed english!!
plz...reply with example!!!

Anonymous said...

so 1 question...

could you list a quick different aproach (not using automatic programs and stuff) i'm trying to not be a newb and learn stuff by using my own stuff and not other peoples stuff... (a lot of 'stuff' I use xD)

siddh on August 26, 2011 at 1:55 AM said...

I can not under stand point 8 and nine please explain it. Nice article

Anonymous said...

sir please help.
my college server did something as i can't download through mediafire. please suggest somethibg as we pay 12000 for the college internet

Anonymous said...

how can I get SSH server/ proxy servers IP address. please

Anonymous said...

I need help with the host part I want to be a hacker can anyone help me

Anonymous said...

what happens after this making tunnel in ssh? show us the method to bypass the firewall of an specific ip adress! thank you

Anonymous said...

how can you hack you CIA OR NASA in 5 min.

Anonymous said...


Anonymous said...


Anonymous said...

I need help.I was given a laptop from my school it has a software called McAfee programmed into it and it can only be removed with an administrator passcode.Please help me?

Anonymous said...

You Will havet to log in to the computer that you have as a administration user. Search the Web to how to login as a administration user to windows and so.

Anonymous said...

How would I jack a computer that is in a different place

Anonymous said...

But my clg pc was secure with domain so that if i install any software than not installed..coz all of pc was secure with admin passwd and connect with domain what i do ???

Anonymous said...

the clg programer wont connect with school programing because of the fire walls

Dare to ask? :)

Blog Archive


Recent Comments


Rafay Baloch is an Independent security researcher, Internet marketer, Entrepreneur and a SEO consultant, He is the founder of RHA blog and multiple other blogs. Rafay got famous after finding a Remote Code Execution bug inside PayPal for which PayPal awarded him a sum of 10,000$ Read More..

Join In!

RHA © 2013. All Rights Reserved.