<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>proxy SOCKS Archives - ITBlogSec.com</title>
	<atom:link href="https://itblogsec.com/tag/proxy-socks/feed/" rel="self" type="application/rss+xml" />
	<link>https://itblogsec.com/tag/proxy-socks/</link>
	<description>IT, network, security and hacking</description>
	<lastBuildDate>Mon, 04 May 2020 14:08:07 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>How to make SOCKS proxy server by using Raspberry Pi</title>
		<link>https://itblogsec.com/how-to-make-socks-proxy-server-by-using-raspberry-pi/</link>
					<comments>https://itblogsec.com/how-to-make-socks-proxy-server-by-using-raspberry-pi/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 04 Jan 2017 11:26:16 +0000</pubDate>
				<category><![CDATA[How to]]></category>
		<category><![CDATA[proxy SOCKS]]></category>
		<category><![CDATA[raspberry pi]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=91</guid>

					<description><![CDATA[<p>Sometimes you're on a network that's insecure or has an overly restrictive firewall, and you need to access a website. You want to make sure no one in the middle is watching the traffic.</p>
<p>The post <a href="https://itblogsec.com/how-to-make-socks-proxy-server-by-using-raspberry-pi/">How to make SOCKS proxy server by using Raspberry Pi</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>How to make SOCKS proxy server by using Raspberry Pi</h2>
<p style="text-align: justify;">Sometimes you&#8217;re on a network that&#8217;s insecure or has an overly restrictive firewall, and you need to access a website. You want to make sure no one in the middle is watching the traffic.</p>
<div id="attachment_167" style="width: 887px" class="wp-caption alignnone"><img fetchpriority="high" decoding="async" aria-describedby="caption-attachment-167" class="border-image wp-image-167 size-full" src="https://itblogsec.com/wp-content/uploads/2017/01/socks_proxy.jpg" width="877" height="329" srcset="https://itblogsec.com/wp-content/uploads/2017/01/socks_proxy.jpg 877w, https://itblogsec.com/wp-content/uploads/2017/01/socks_proxy-300x113.jpg 300w, https://itblogsec.com/wp-content/uploads/2017/01/socks_proxy-768x288.jpg 768w" sizes="(max-width: 877px) 100vw, 877px" /><p id="caption-attachment-167" class="wp-caption-text">Network scenario to use home based server (raspberry Pi) for secure browsing</p></div>
<h5><strong>INTRODUCTION</strong></h5>
<p style="text-align: justify;">The easiest way to be sure that nobody is sniffing your communication is using your home-located raspberry PI with public IP or dynamic DNS (reachable from the Internet). As such communication is forwarded via encrypted SSH tunnel, nobody is able to decrypt it and see your sensitive data. Such deployment does not require any additional client software installation so you can use it also on computer with limited privileges.</p>
<p style="text-align: justify;">A SOCKS proxy is basically SSH tunnel. All requests are forwarded to the SSH tunnel which is transporting data to the destination server and then on the server end, the proxy forwards the traffic out to the general Internet.</p>
<p style="text-align: justify;">In our scenario we will use raspberry PI which is running in your home network but publicly accessible from the Internet (via dynamic DNS or public IP). In the same way you can use any linux-based OS (Ubuntu). One big advantage of using Raspberry Pi is it&#8217;s power consumption (~ 4-5 W/h) so it can be running continuously without interruption and you can connect and use it anytime.</p>
<h5 style="text-align: justify;">USAGE SCENARIOS</h5>
<p style="text-align: justify; padding-left: 30px;">A) To encrypt your traffic during browsing on free/open Wifi hotspots (airport, hotel etc.) &#8211; nobody is able to sniff your sensitive data<br />
B) To connect to your home network so you can access your web-camera, IPTV, router etc.<br />
C) To access pages which are usually blocked by local network you are connected to (bypass proxy, firewall rules etc.)</p>
<h5 style="text-align: justify;"> </h5>
<h5 style="text-align: justify;"><strong>PREREQUISITES</strong></h5>
<ul>
<li>raspberry PI with installed image (e.g. <a href="https://www.raspberrypi.org/downloads/raspbian/">Raspbian image</a>)</li>
<li>raspberry PI accessible from the Internet (via dynamic DNS or public IP).</li>
<li>laptop/pc or mobile connected to the Internet (running WINDOWS OS, MAC OS X or LINUX)</li>
</ul>
<h5>STEPS (WINDOWS OS)</h5>
<p style="padding-left: 30px;">1. Download portable putty application <a href="http://portableapps.com/apps/internet/putty_portable">here</a></p>
<div id="attachment_169" style="width: 476px" class="wp-caption alignnone"><img decoding="async" aria-describedby="caption-attachment-169" class="border-image wp-image-169 size-full" src="https://itblogsec.com/wp-content/uploads/2017/01/putty_01.png" alt="2. Add the Host Name (or IP address) of your server, and the SSH Port (typically 22)" width="466" height="450" srcset="https://itblogsec.com/wp-content/uploads/2017/01/putty_01.png 466w, https://itblogsec.com/wp-content/uploads/2017/01/putty_01-300x290.png 300w" sizes="(max-width: 466px) 100vw, 466px" /><p id="caption-attachment-169" class="wp-caption-text">Open putty and navigate to session tab</p></div>
<p style="padding-left: 30px;"><span style="color: #ff0000;">2. Add the Host Name (or IP address) of your server, and the SSH Port (typically 22)</span></p>
<div id="attachment_170" style="width: 476px" class="wp-caption alignnone"><img decoding="async" aria-describedby="caption-attachment-170" class="border-image wp-image-170 size-full" src="https://itblogsec.com/wp-content/uploads/2017/01/putty_02.png" width="466" height="450" srcset="https://itblogsec.com/wp-content/uploads/2017/01/putty_02.png 466w, https://itblogsec.com/wp-content/uploads/2017/01/putty_02-300x290.png 300w" sizes="(max-width: 466px) 100vw, 466px" /><p id="caption-attachment-170" class="wp-caption-text">Navigate to Connection -&gt; SSH -&gt; Tunnels</p></div>
<p style="padding-left: 30px;"><span style="color: #ff0000;">3. Type source port which will be listening on source machine (in our case 9001)</span><br />
<span style="color: #ff0000;"> 4. Select &#8220;Dynamic&#8221; radio button</span><br />
<span style="color: #ff0000;"> 5. Click button &#8220;Add&#8221;</span></p>
<div id="attachment_174" style="width: 476px" class="wp-caption alignnone"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-174" class="border-image wp-image-174 size-full" src="https://itblogsec.com/wp-content/uploads/2017/01/putty_03.png" width="466" height="450" srcset="https://itblogsec.com/wp-content/uploads/2017/01/putty_03.png 466w, https://itblogsec.com/wp-content/uploads/2017/01/putty_03-300x290.png 300w" sizes="(max-width: 466px) 100vw, 466px" /><p id="caption-attachment-174" class="wp-caption-text">Navigate back to the session tab</p></div>
<p style="padding-left: 30px;"><span style="color: #ff0000;">6. Name your session for further loading (so you do not have to repeat all steps again)</span><br />
<span style="color: #ff0000;"> 7. Click button &#8220;Save&#8221; and then click button &#8220;Open&#8221; and enter your credentials in order login</span></p>
<p><div id="attachment_179" style="width: 1205px" class="wp-caption alignnone"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-179" class="border-image wp-image-179 size-full" src="https://itblogsec.com/wp-content/uploads/2017/01/whatIsMyIP.png" width="1195" height="592" srcset="https://itblogsec.com/wp-content/uploads/2017/01/whatIsMyIP.png 1195w, https://itblogsec.com/wp-content/uploads/2017/01/whatIsMyIP-300x149.png 300w, https://itblogsec.com/wp-content/uploads/2017/01/whatIsMyIP-768x380.png 768w, https://itblogsec.com/wp-content/uploads/2017/01/whatIsMyIP-1024x507.png 1024w" sizes="(max-width: 1195px) 100vw, 1195px" /><p id="caption-attachment-179" class="wp-caption-text">Check you current public IP by using https://www.whatismyip.com/</p></div> <div id="attachment_207" style="width: 470px" class="wp-caption alignnone"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-207" class="border-image wp-image-207 size-full" src="https://itblogsec.com/wp-content/uploads/2017/01/browser_proxy_config.png" width="460" height="613" srcset="https://itblogsec.com/wp-content/uploads/2017/01/browser_proxy_config.png 460w, https://itblogsec.com/wp-content/uploads/2017/01/browser_proxy_config-225x300.png 225w" sizes="(max-width: 460px) 100vw, 460px" /><p id="caption-attachment-207" class="wp-caption-text">Mozilla browser -&gt; Options -&gt; Advanced -&gt; Network -&gt; Settings</p></div></p>
<p style="padding-left: 30px;"><span style="color: #ff0000;">8. Select radio button &#8220;Manual proxy configuration&#8221;</span><br />
<span style="color: #ff0000;"> 9. Input localhost and local port 9001</span><br />
<span style="color: #ff0000;"> 10. Check Proxy DNS in case you want to forward also DNS requests via proxy tunnel (recommended)</span></p>
<p style="text-align: justify;">Now, open another tab in Firefox and start browsing the web! You should be all set for secure browsing through your SSH tunnel. By checking your public IP, you should be able to see that for now you are using different IP. All connections (including DNS) should be encrypted and invisible for possible attackers.</p>
<h5 id="step-1-mac-os-x-linux-—-setting-up-the-tunnel">STEPS (Mac OS X/Linux)</h5>
<ol>
<li>on local machine run following command to open SSH tunnel<em><em><em>ssh -D 9001 -f -C -q -N user@your_domain_name_or_IP.com<br />
</em></em></em><em>Arguments:</em><em><br />
-D</em>: creating dynamic SSH tunnel<br />
<em>-f</em>: running command in background<br />
<em>-C</em>: compress data before sending<br />
<em>-q</em>: quite mode<br />
<em>-N</em>: no commands will be sent once tunnel is UP</li>
<li>check that your tunnel is running<br />
<em>ps aux | grep 9001<br />
</em>Output:<br />
<img loading="lazy" decoding="async" class="border-image alignnone wp-image-233 size-full" src="https://itblogsec.com/wp-content/uploads/2017/01/socks_image_01.png" width="876" height="47" srcset="https://itblogsec.com/wp-content/uploads/2017/01/socks_image_01.png 876w, https://itblogsec.com/wp-content/uploads/2017/01/socks_image_01-300x16.png 300w, https://itblogsec.com/wp-content/uploads/2017/01/socks_image_01-768x41.png 768w" sizes="(max-width: 876px) 100vw, 876px" /></li>
<li>check that your machine is listening on localhost and ready to forward traffic via tunnel<br />
<em>sudo netstat -antp<br />
</em>Output:<br />
<img loading="lazy" decoding="async" class="border-image alignnone wp-image-235 size-full" src="https://itblogsec.com/wp-content/uploads/2017/01/socks_image_02.png" width="780" height="79" srcset="https://itblogsec.com/wp-content/uploads/2017/01/socks_image_02.png 780w, https://itblogsec.com/wp-content/uploads/2017/01/socks_image_02-300x30.png 300w, https://itblogsec.com/wp-content/uploads/2017/01/socks_image_02-768x78.png 768w" sizes="(max-width: 780px) 100vw, 780px" /></li>
<li>Now repeat the same steps to configure Mozilla Firefox (described above)</li>
<li>If you want to disable SSH tunnel, you need to kill process (in our case it is PID 15803)<br />
<em><em>kill 15803</em></em></li>
</ol>
<h5>CONCLUSION</h5>
<p>Nowadays almost everybody is talking about IT security, hackers and possible attacks. Pay some minutes to follow simple steps to encrypt your traffic using SOCKS proxy when you are on way. Do not get any chance to provide your sensitive data to third-party person who can use it illegally.</p>
<p>The post <a href="https://itblogsec.com/how-to-make-socks-proxy-server-by-using-raspberry-pi/">How to make SOCKS proxy server by using Raspberry Pi</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/how-to-make-socks-proxy-server-by-using-raspberry-pi/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 0/176 objects using XCache
Page Caching using Disk: Enhanced 

Served from: itblogsec.com @ 2025-12-01 23:56:30 by W3 Total Cache
-->