i have two ips . a valid and internal(172.16.11.2)
i want to use port forwarding to forward any request to valid IP port 8001 to internal ip port 80 .
i use this rule :
there is a problem !
sometime on my apache server http changes to https in some pages ! in this situation redirection does not work !and https page wont load !
how can i fix that !!
or is there any way to forward port to a ip address ??
for example : any request to port 8001 redirect to a ip address ???
I've been googling for a while now, trying to forward port 3000 to port 80....
In the past I used to DLink router to forward port 3000 to 80. I recently finished (well, is it ever done anyhow?) setting up my linux box and got it acting as a router.
I want to continue to run Apache on port 80... (1 Reply)
Hi,
I have to install an application that has a built in tftp server. Tftp comes in on port 69. As i am not installing this application as a root user i am running into trouble because only the root user can listen to ports < 1024. So changing the port i listen to to one greater than 1023 isn't... (1 Reply)
Hi friends
i have the following setup
machine1 two network adapters one connected to lan the other connected directly to machine2
machine2 is not connected to lan
i need to access machine2 directly from the LAN
how to force machine1 to forward all traffic received on a specific port the... (1 Reply)
Hi
I want to set up port forwarding from one network to another network. I already have this configured on the Linux box using iptables.
iptables -t nat -A PREROUTING -p tcp -i eth1 --dport 1521 -j DNAT --to 10.218.146.230
iptables -A FORWARD -p tcp -i eth1 -d 10.218.146.230 -j ACCEPT
... (2 Replies)
Hi,
I am looking out a way to forward all UDP traffic coming on ports 3001,3002,3003 and 3004 on server 10.2.45.200
to
corresponding ports of server 10.2.45.197.
I am using Solaris 10.0.
-bash-3.00$ uname -a
SunOS airtelussd2 5.10 Generic_127127-11 sun4u sparc SUNW,Sun-Fire-V445
Is... (6 Replies)
Hi; I have the following issue:
I have a Solaris server running an old applications which connects to an http server in other server at certain port. The thing is that the http server has changed its ip and port and the addres in the app is hard coded and touching the app by now is out of the... (0 Replies)
Hi Linux/Unix Guru,
I am setting Linux Hopping Station to another different servers.
My current config to connect to another servers is using different port to connect.
e.g
ssh -D 1080 -p 22 username@server1.com
ssh -D 1081 -p 22 username@server2.com
Now what I would like to have... (3 Replies)
Hi Everyone,
Hope all Doing good,
we have a Dedicated server and its installed with proxmox VE 3.2, My Need is i want Protect my server and only i need to allow the specific port in the server, And i want to forward some of ports 22,80,443 to those VM's inside my dedicated... (0 Replies)
Hi experts,
We have windows machine ( A ) in one network & 2 Linux Servers ( B & C ) in another network. There is a firewall between these 2 networks and SSH (TCP/22) & HTTPS (TCP/443) are allowed from A to B only (but not to C). There is no personal firewall / iptables running on any machine.... (1 Reply)
Hello All,
I would like to ask you very kindly with /etc/sysconfig/iptables file
I have to setup port forwarding on RHEL6 router. Users from public network must be able to ssh to servers in private network behind RHEL6 router. Problem is that servers in private network must be isolated.
My... (2 Replies)
Discussion started by: oidipus
2 Replies
LEARN ABOUT DEBIAN
sslsniff
SSLSNIFF(1) General Commands Manual SSLSNIFF(1)NAME
sslsniff - SSL/TLS man-in-the-middle attack tool
SYNOPSIS
sslsniff [options]
DESCRIPTION
This manual page documents briefly the sslsniff command.
sslsniff is designed to create man-in-the-middle (MITM) attacks for SSL/TLS connections, and dynamically generates certs for the domains
that are being accessed on the fly. The new certificates are constructed in a certificate chain that is signed by any certificate that is
provided.
sslsniff also supports other attacks like null-prefix or OCSP attacks to achieve silent interceptions of connections when possible.
OPTIONS
Modes:
-a Authority mode. Specify a certificate that will act as a CA.
-t Targeted mode. Specify a directory full of certificates to target.
Required options:
-c <file|directory>
File containing CA cert/key (authority mode) or directory containing a collection of certs/keys (targeted mode)
-s <port>
Port to listen on for SSL interception.
-w <file>
File to log to
Optional options:
-u <updateLocation>
Location of any Firefox XML update files.
-m <certificateChain>
Location of any intermediary certificates.
-h <port>
Port to listen on for HTTP interception (required for fingerprinting).
-f <ff,ie,safari,opera>
Only intercept requests from the specified browser(s).
-d Deny OCSP requests for our certificates.
-p Only log HTTP POSTs
-e <url>
Intercept Mozilla Addon Updates
-j <sha256>
The sha256sum value of the addon to inject
NOTES
sslsniff works only on the FORWARD traffic (not on INPUT or OUTPUT).
EXAMPLES
To intercept traffic on port 8443, start sslsniff on a local port:
sslsniff -a -c /usr/share/sslsniff/certs/wildcard -s 4433 -w /tmp/sslsniff.log
and redirect traffic to this port using the iptables nat table:
iptables -t nat -A PREROUTING -p tcp --destination-port 8443 -j REDIRECT --to-ports 4433
AUTHOR
sslsniff was written by Moxie Marlinspike.
This manual page was written by Pierre Chifflier <pollux@debian.org>, for the Debian project (and may be used by others).
August 16, 2009 SSLSNIFF(1)