Working in the information security field it’s frequently handy to be able to browse the web in different configurations. Sometimes you want to be able to see and interact with our traffic we speak with a server, sometimes you want to hide where we’re coming from on the other end, and other times we need to bypass a filter that’s keeping us from browsing.
Here are three basic configurations that achieve these objectives. I personally use Google Chrome and the Proxy Switchy extension to handle my various proxies.
localhost:8080
. Start up your proxy and make sure it’s listening on the same port and you’re ready to go. Note: any proxy works for this; I prefer Burp on my desktop of choice, which is OS X.netstat
or lsof -i | grep -i tor
to ensure you’ve got the right port. Then select that option from Proxy Switchy and browse. Do a Google search for ‘ip‘ and notice it’s not your original anymore.ssh -D8081 user@host
. In PuTTY, go to the tunnels section and create a new tunnel with the port number and the dynamic option set, and then another with the same port number, the local option set, and your destination host and port, like so: host.com:port
. Save your PuTTY session, connect to it, then switch to that proxy selection in your browser and browse through away. Check your IP again and notice you’re coming from your SSH box now1. I configure these browsing options immediately upon setting up any new system. Consider adding them to your basic build as well, as they allow you increased flexibility and functionality in a number of situations.
If you have any similar tips, do let me know. I’d love to hear about them.
::
1 Be sure you have permission to bypass access controls before doing this.