PowerShell+ 2019 - Firewall Evasion and Remote Access with OpenSSH by Anthony Nocentino

Channel:
Subscribers:
42,400
Published on ● Video Link: https://www.youtube.com/watch?v=2D9i3LqBfAU



Duration: 43:18
15 views
0


OpenSSH is much more than just remote terminal access to servers, it provides a full suite of remote connectivity methods to your network and its services. In this session, we will look at how to use OpenSSH and its forwarding, tunneling and VPN capabilities so that we can reach securely reach network services that are behind firewalls and other security boundaries. Common use cases for these techniques are cloud jump boxes, secure access into segmented networks and being able to get remote access and move data around in poorly secured networks....these tips are things that will likely get you some extra attention from your security team
* We will look at the following techniques
* Accessing remote application services with SSH Tunneling
* Accessing remote networks with SSH-based VPN
* Building SSH connections for multi-hop remote access using ProxyHosts
* Proxying HTTP/HTTPS connections with SocksProxy
* Using aliases to store these advanced configurations for easy use
* Controlling and preventing TCP tunneling

PowerShell Summit videos are recorded on a "best effort" basis. We use a room mic to capture as much room audio as possible, with an emphasis on capturing the speaker. Our recordings are made in a way that minimizes overhead for our speakers and interruptions to our live audience. These recordings are meant to preserve the presentations' information for posterity, and are not intended to be a substitute for attending the Summit in person. These recordings are not intended as professional video training products. We hope you find these videos useful - the equipment used to record these was purchased using generous donations from members of the PowerShell community.




Other Videos By Confreaks


2022-09-05RustConf 2022 - Your Open Source Repo Needs A Project Manager by Alice Cecile
2022-09-05RustConf 2022 - Writing a GraphQL compiler in Rust, a case study by Iryna Shestak
2022-09-05RustConf 2022 - How we ship Rust in OpenSUSE by William Brown
2022-09-05RustConf 2022 - Bootstrapping: The once and future compiler by Joshua Nelson
2022-09-05RustConf 2022 - All aboard the Rust (electric freight) train! by Julie Wang
2022-09-05RustConf 2022 - The Sheer Terror of PAM by Xe Laso
2022-09-05RustConf 2022 - What If We Pretended Unsafe Code Was Nice, And Then It Was? by Aria Beingessner
2022-09-05RustConf 2022 - Async Rust: Past, Present, and Future by Nick Cameron
2022-09-05RustConf 2022 - Opening Keynote by Josh Triplett and Tyler Mandry
2022-09-01PowerShell+ 2019 - Doctor, Don't Defenestrate: What to Do with Legacy Scripts by Michael Lombardi
2022-09-01PowerShell+ 2019 - Firewall Evasion and Remote Access with OpenSSH by Anthony Nocentino
2022-09-01PowerShell+ 2019 - Securing PowerShell: Hands-On Lab by Ashley McGlone
2022-09-01PowerShell+ 2019 - Microsoft Azure Policy Guest Configuration by Michael Greene
2022-09-01PowerShell+ 2019 - Writing Compiled PowerShell Cmdlets by Thomas Rayner
2022-09-01PowerShell+ 2019 - Parselmouth - bending the PowerShell language by Mathias Jessen
2022-09-01PowerShell+ 2019 - PowerShell Remoting Internals by Paul Higinbotham
2022-09-01PowerShell+ 2019 - PSScriptAnalyzer (PSSA) VS-code integration & ... by Christoph Bergmeister
2022-09-01PowerShell+ 2019 - Unexplained phenomena: powerful tricks you likely didn't know... by Kirk Munro
2022-09-01PowerShell+ 2019 - Bullet-proofing Patterns & Practices by Joel "Jaykul" Bennett
2022-09-01PowerShell+ 2019 - Machine Learning Algorithms with H2o and PowerShell by Tome Tanasovski
2022-09-01PowerShell+ 2019 - CypherDog2.0 - Bloodhound Dog Whispering with PowerShell by Walter Legowski