TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Show HN: The Cyber Plumber's Handbook – SSH Tunnel Like a Boss

277 pointsby opsdiskabout 6 years ago
Looking to get some feedback from the Hacker News community.<p>I wrote the book with a focus on penetration testers and red teamers, but there are great examples for network admins, developers, and blue team defenders as well.<p>You can pick up a copy for free here through May 19, 2019: <a href="https:&#x2F;&#x2F;gumroad.com&#x2F;l&#x2F;the_cyber_plumbers_handbook&#x2F;hackernews20190518" rel="nofollow">https:&#x2F;&#x2F;gumroad.com&#x2F;l&#x2F;the_cyber_plumbers_handbook&#x2F;hackernews...</a><p>Please note, because it&#x27;s hosted on Gumroad, it does require an email. If you don&#x27;t want to give out your actual email, check out an anonymous email service. I give it away to students for free, so if you know of one that might like it, send them here to get instructions: <a href="https:&#x2F;&#x2F;cph.opsdisk.com" rel="nofollow">https:&#x2F;&#x2F;cph.opsdisk.com</a><p>About The Cyber Plumber&#x27;s Handbook...<p>This book is packed with practical and real world examples of SSH tunneling and port redirection in multiple realistic scenarios. It walks you through the basics of SSH tunneling (both local and remote port forwards), SOCKS proxies, port redirection, and how to utilize them with other tools like proxychains, nmap, Metasploit, and web browsers.<p>Advanced topics included SSHing through 4 jump boxes, throwing exploits through SSH tunnels, scanning assets using proxychains and Metasploit&#x27;s Meterpreter, browsing the Internet through a SOCKS proxy, utilizing proxychains and nmap to scan targets, and leveraging Metasploit&#x27;s Meterpreter portfwd command.<p>Let me know if you have any questions! Looking forward to your comments&#x2F;feedback.

17 comments

xoaabout 6 years ago
Thanks for sharing and the effort put in so far. After a quick glance over I think you should consider giving at least a glancing mention in your intro section to the importance of hardening SSH itself vs the typical default install. It doesn&#x27;t need to be much since it&#x27;s somewhat out of scope of your specific focus here, but it&#x27;d be worth a few sentences mentioning the value of keys over passwords (and disabling passwords entirely), that keys can be kept on tokens as well (YubiKeys&#x2F;NitroKeys for example), value of disabling ancient ciphers, that sort of thing. You say the book assumes &quot;some experience with SSH&quot;, but given your stated audience includes admins&#x2F;devs&#x2F;blue team as well (and in another comment I see someone talking about using it with students) and I&#x27;ve seen a ton of really bad SSH setups used there, I think even a sentence or two about assuming hardening as well to get people into search engines (if you don&#x27;t feel like more) would be valuable in the context of intrusion response.
评论 #19949386 未加载
inflatableDodoabout 6 years ago
This looks great. Though I must admit, &#x27;SSH Tunnel Like a Boss&#x27; did make me intially doubtful. I wondered if it might be advice on how to find someone else to set up an ssh tunnel for you, while staring angrily at a command prompt and shouting.
anigbrowlabout 6 years ago
Really nice to see the &#x27;plumbing&#x27; mindset catching on. When the parallels to real-world utility work were first pointed out a lot of people were resistant to it because they felt insulted to have their high technology work compared to dirty low technology.
评论 #19949437 未加载
评论 #20015349 未加载
评论 #19954599 未加载
评论 #19950599 未加载
mrzoolabout 6 years ago
Looks great, thanks for sharing. Any plan to make an epub available? I’d love to read it on an e-ink display.
评论 #19949875 未加载
Bucephalus355about 6 years ago
I am somewhat in tears now seeing this. I spent weeks at work trying to backwards analyze GCP IAP, which apparently uses this in the background (invoked via the gcloud CLI).<p>Almost like a lost art, it was impossible to find serious tutorials other than Michael W. Lucas’s book of a couple of years ago or the O’Reilly book from 2006.<p>Very much appreciated. Thank you for documentation on these very important systems that many of us sysadmins who came into the field later in life missed (other than when we connect to our cloud servers). Soon, even the cloud part I mentioned will be gone mostly to because of ‘kubectl’, as Kelsey Hightower has said.
评论 #19948766 未加载
评论 #19949352 未加载
leetbulbabout 6 years ago
This is great, thank you. I&#x27;m a big fan of socat for plumbing in pentesting environments, it&#x27;s an amazing tool. Never had much luck with meterpreter&#x27;s port forwarding as it seems to always eventually bug out.
评论 #19949368 未加载
171243about 6 years ago
Good topic and looks like some good examples. The formatting is nice, easy on the eyes but there is excessive whitespace in the book. Having large screenshots means when they don&#x27;t fit on the page they get bumped to the next and a huge gapping whitespace appears. I can tell this is stretching out the length of the book. I&#x27;d peg it at really only about 50 pages of content instead of the 76. For an example just look at page 75&#x2F;76 and how the content is distributed.
emptysongglassabout 6 years ago
I&#x27;d really appreciate an epub. I read anything across a variable range of display sizes and PDFs just don&#x27;t cut it anymore.
miccahabout 6 years ago
Wow, this looks great, thanks for sharing!<p>You mention this book as targetting pentesters. Do you have any advice on tools or skills to know for a software engineer to transition to a pentesting role?<p>I ask because there are many resources for pentesting, but not any that I have found to reflect what happens in industry.<p>Thank you again!
评论 #19953701 未加载
rvalueabout 6 years ago
I looked at the table of contents and I am guessing it has many handy tricks and command line examples of already public tools. Doesn&#x27;t look like its should be as costly as 19$. Would you like to bring it down to one-digit costs ?
评论 #19949855 未加载
评论 #19950817 未加载
CoryG89about 6 years ago
This is great. I have just recently purchased access to a VPN service and also a proxy service and have been learning about SSH tunneling. Can&#x27;t wait to dig into this.
wdrozalmost 6 years ago
Small typo at page 36, you are using local port forward instead of a remote port forward in the command.
评论 #19979721 未加载
canphazabout 6 years ago
Hi! Sounds great! However i get he message that the discount code is not valid anymore and it is $19.99 again. Am i doing something wrong?
评论 #19949362 未加载
cjcampbellabout 6 years ago
I am pumped to see this right now, as it will be a great resource for my intro networking students (at the perfect moment in the quarter).
评论 #20009967 未加载
devinjflickalmost 6 years ago
Dang it I found this post on Monday after the free give away ended. Any way of still getting a free copy?
deleteriousabout 6 years ago
On this side of the world it&#x27;s 5.18.19 and yet $19 bucks for the book. Also did not ask for an email, so in essence, I have no words.
评论 #19949341 未加载
评论 #19949623 未加载
jmakovabout 6 years ago
Cool writeup. Thanks for sharing!