Well, we saw in the previous post on this topic to connect to a Lineage II server through an SSH tunnel circumventing a firewall. In this post will conclude this topic by explaining how to make the connection when the server changes the client instead of modifying the hosts file.
Actually this entry also explains a way to redirect any links to go to a specific IP to a different IP using an SSH tunnel. This ability is particularly useful for example when we want to go or when we Firewalls old programs that are no longer maintained and has an IP burned in the code can not change and need to connect to a different IP address, among other possibilities.
About This entry
This entry explains how to use an SSH tunnel to forward connections to certain IP range so they go to a different IP address of your choice. To explain this issue I will use an example, a connection through a firewall using SSH tunneling to connect to a server of Lineage II to adjust the client.
In this particular example makes a connection to Ludmila server, a server at the moment to write this entry was a low rate server (7x) running with Lineage II - CT1 Hellbound
For more information about the topic being addressed in this post please read previous blog entries on the same subject.
Before
Before you can use this technique, you need some information, in particular we need the IP addresses and ports to connect the client needs to perform IP forwarding. This information can most certainly get the server page where you play or maybe asking in this forum, however, show here a technic for this information for our own monitoring active connections on the PC.
Before attempting to describe it then tries to minimize as much as possible your PC has connections with the network, close the programs that use the Internet as Messenger, Skype, Outlook, etc. Ideally if you can is that there is no active connection.
then open a console and run: netstat-n
-p tcp
the console will see something like this:
Well, now re-enter the command in the console but do not press Enter, that is, the console must be ready to execute the command. Then open the Lineage client II and write your data login, then click on Login or press Enter and quickly press ALT + TAB to switch to the console and press Enter to run the command that was prepared in the console.
appear immediately see the new connection with IP and port. Well, we already have the information from the authentication server. Then select the server in the server list and hit Connect, when you see the list of characters running the command again and you'll receive the IP and port of the game server, something like this:
Ok, and have the IPs and ports that need to connect, these are:
- 190.224.162.71:666
- 190.224.162.71:7777 190.224.162.74:2106
Whether in your case the client connects to destinations more or less what is important is that you fill in the IPs and ports you'll need to redirect. Prepare
network card
Next we will prepare the network card to forward the connections that would normally through the gateway back to our team. I explained how to do it in the previous post, here just show you a screenshot of how you see the Advanced Settings page IPv4:
Note that I added the two IP addresses the server of the game that we detected (190.224.162.71 and 190.224.162.74) in addition to the IP local network connection (192.168.0.174) leaving the network card with a total of three IP addresses. Create
SSH Tunnel
Next we will create the SSH tunnel. To make it back to use Putty as it is the easiest. The basic steps to establish the connection and I have explained in previous posts so that we only show you a screenshot of the configuration as shown in tunnels:
Ready, set the tunnels once we give the button Open and establish connection to the relay team. Once the putty connection is listening on ports 666, 7777 and 2106 ready to make the IP forwarding to the actual game server.
opened the game and connect as usual. Congratulations! Some final comments
This concludes this short tutorial on SSH tunneling to bypass firewalls. Although this may seem like a set of tutorials written with a certain disdain for the rules and with intent to enable anyone to read violating company policy or an educational institution is not really well.
This material was written for the purpose of making available other knowledge that is very light. And yet here it says could be used for illegal purposes and evil also has many beneficial applications, you can get a fix to an IT professional in some cases.
weaknesses also shows that some systems have and show to close ports on a firewall is no guarantee that will prevent unwanted connections.
I am always open to comments and receive them with pleasure. Please if you have comments, questions, questions, or whatever do not hesitate to leave a comment in the entry or send me an email.
0 comments:
Post a Comment