[-] Ponziani@sh.itjust.works 2 points 2 weeks ago

Im a little knowledgeable with this stuff but i do not know how to see the "handshake" itself, but maybe this is synonymous with what i am doing:

Right click any of the packets (TCP or SSH) > Follow > TCP stream

From there i can see some info about the ssh protocol and connection, as well as the 2 devices communicating (Operating systems used) followed by random gibberish which is the encrypted data.

When I analyze the TCP packet "frames", they contain data including the motherboard manufacturer, but packets themselves look like its just gibberish.

Thanks by the way for trying to help me :)

[-] Ponziani@sh.itjust.works 2 points 3 weeks ago

It looks like everything is in 1 stream, maybe that answers your question? I am capturing traffic only on port 22 briefly while the rsync is running to look at the packets

[-] Ponziani@sh.itjust.works 2 points 2 months ago

Thank you both

[-] Ponziani@sh.itjust.works 2 points 2 months ago

Awesome now I understand what you and the other commenter were talking about with aliasing. Well this works perfect without the alias, many thanks

[-] Ponziani@sh.itjust.works 1 points 2 months ago

This does seem to be exactly what i am looking for. I implemented this and tested it and the command still isn't working yet but i will keep troubleshooting, its probably a silly quirk on my end. Thank you very much!

[-] Ponziani@sh.itjust.works 1 points 3 months ago

Thank you for the info! This is very helpful to me.

[-] Ponziani@sh.itjust.works 2 points 3 months ago

But the router must forward the port to allow the VPN to be utilized , meaning that port being forwarded can be scanned/detected i thought?

[-] Ponziani@sh.itjust.works 2 points 3 months ago

This is the first that I have heard about setting the SSH port to only accept connections from the VPN, is there a term or something I can search about this online? Or is this basically just allowing port 22 open on a device and not forwarding the port on the router as when a different device tunnels into the same network through the VPN it can already talk to the first device?

[-] Ponziani@sh.itjust.works 2 points 3 months ago

But wouldn't the port being open alert anyone who looks for that? Network security is not my specialty but I believe I have read that people can ping/scan ip addresses easily and quickly to determine if any ports are open / forwarded, so if Wireguard was used or any VPN software, they could pick up on that as an attack vector?

[-] Ponziani@sh.itjust.works 2 points 3 months ago

Thanks for chiming in, im glad its not just me. I feel like i have a much stronger understanding on things more complicated tham groups! That makes it feel worse

[-] Ponziani@sh.itjust.works 2 points 5 months ago

Can web elements be sandboxed in any meaningful way?

view more: ‹ prev next ›

Ponziani

joined 5 months ago