94:72:55:9f:a3:b4:59:f1:c1:b0:ab:17:b9:35:29:cc (ECDSA) 18:11:e2:0a:18:51:b8:f2:5e:a6:0b:6e:c3:c5:43:59 (RSA)00:25:47 up 82 days, 9:17, 0 users, load average: 0.10, 0.06, 0.09
Tunneling with PuTTY (Windows)
This guide assumes you are using Windows and have already set up PuTTY to connect. If not, have a look here. Don't worry linux or mac users, tunneling is so ridiculously simple there it doesn't need so much of a guide.
Navigate to the Tunnels configuration page, and add a new dynamic tunnel on port 9090. The port you use doesn't actually matter, however for this example we'll use 9090. If you can't use 9090, you must remember to use the same port here as you do later.
Verify that the Tunnels page now looks like this. The important bit is D9090 in the list. Now that you've added it, click Open and connect as you would normally do.
Having connected, you are now tunneling over SSH. You need to leave this window open the whole time while you browse, since PuTTY is keeping the tunnel open. You can actually use your Anapnean shell in this PuTTY window, just as you would normally: it's a normal connection with the tunnel added on in the background.
Clicking on Settings in Internet Explorer, or Proxy Settings in Google Chrome, should open this dialogue. Navigate through to the Advanced Proxy section and add localhost:9090 as a SOCKS Proxy.
Finally, you may like to use a website that tells you your IP address, in order to verify that tunneling is working correctly. We have hosted a small file that will verify that you are tunneling your browsing through Anapnea.
Nenhum comentário:
Postar um comentário