If you're looking at going even deeper into SSH tunneling and port redirection, I recently made The Cyber Plumber's Handbook free: <a href="https://github.com/opsdisk/the_cyber_plumbers_handbook" rel="nofollow">https://github.com/opsdisk/the_cyber_plumbers_handbook</a><p>I made it free to the HN community a few years back [1]. There is a paid interactive lab portion (details in the repo) if you are looking for hands-on experience.<p>Book Overview<p>This book is packed with practical and real world examples of SSH tunneling and port redirection in multiple realistic scenarios. It walks you through the basics of SSH tunneling (both local and remote port forwards), SOCKS proxies, port redirection, and how to utilize them with other tools like proxychains, nmap, Metasploit, and web browsers.<p>Advanced topics included SSHing through 4 jump boxes, throwing exploits through SSH tunnels, scanning assets using proxychains and Metasploit's Meterpreter, browsing the Internet through a SOCKS proxy, utilizing proxychains and nmap to scan targets, and leveraging Metasploit's Meterpreter portfwd command.<p>[1] <a href="https://news.ycombinator.com/item?id=19946941" rel="nofollow">https://news.ycombinator.com/item?id=19946941</a>