Now you can create your own tunnel to hide your IP address. The gtunnel tool creates an exe file based on an operating system like Windows/Linux, this exe file creates a connection directly to the server by using the tunneling process. This tunnel is very secure to communicate between source and destination systems.
- OS: Kali Linux 2020 64 bit or it can be your public server to hide your IP.
- Kernel version: 5.6.0
- Use this command to clone the project.
- git clone https://github.com/hotnops/gtunnel
root@kali:/home/iicybersecurity# git clone https://github.com/hotnops/gtunnel Cloning into 'gtunnel'... remote: Enumerating objects: 186, done. remote: Counting objects: 100% (186/186), done. remote: Compressing objects: 100% (104/104), done. remote: Total 186 (delta 85), reused 159 (delta 63), pack-reused 0 Receiving objects: 100% (186/186), 12.62 MiB | 2.19 MiB/s, done. Resolving deltas: 100% (85/85), done.
- Use the cd command to enter into gtunnel directory.
root@kali:/home/iicybersecurity# cd gtunnel/ root@kali:/home/iicybersecurity/gtunnel#
- Next, install docker in our machine by using this command sudo apt install docker.io
root@kali:/home/iicybersecurity/gtunnel# sudo apt install docker.io Reading package lists... Done Building dependency tree Reading state information... Done The following additional packages will be installed: cgroupfs-mount libintl-perl libintl-xs-perl libmodule-find-perl libmodule-scandeps-perl libproc-processtable-perl libsort-naturally-perl needrestart runc tini Suggested packages: ==================================================================================================SNIP================================================================================================================================ Created symlink /etc/systemd/system/sockets.target.wants/docker.socket → /lib/systemd/system/docker.socket. Setting up libintl-xs-perl (1.26-2+b5) ... Processing triggers for systemd (245.6-2) ... Processing triggers for man-db (2.9.3-2) ... Processing triggers for kali-menu (2020.3.2) ...
- After installing the docker, use this command to download the gtunnel image file using docker and start the server.
root@kali:/home/iicybersecurity/gtunnel# ./start_server.sh Sending build context to Docker daemon 13.36MB Step 1/20 : FROM golang:1.14 1.14: Pulling from library/golang d6ff36c9ec48: Pull complete c958d65b3090: Pull complete edaf0a6b092f: Pull complete 80931cf68816: Pull complete 813643441356: Pull complete a54c81388677: Pull complete 31748c757dd4: Pull complete ===================================================================================================SNIP================================================================================================================================ Removing intermediate container 923d00e6148a ---> 1a1372d230ae Step 20/20 : CMD ["go", "run", "gServer/gServer.go"] ---> Running in d2a945bbc462 Removing intermediate container d2a945bbc462 ---> acc9e3cb6086 Successfully built acc9e3cb6086 Successfully tagged gtunnel-server:latest
- Here, we have few help options.
- Now, use this command to configure the client configclient <OS> <server’s IP> <Port> <File name>
- configclient win 192.168.0.28 443 iics1
>>> configclient win 192.168.0.28 443 iics1 >>>
- Generated exe file will be stored in the configured directory. Use cd command to move into the configured directory and send the exe file to the client machine.
- When the client run’s the exe file tunnel will be established to the server machine.
>>> configclient win 192.168.0.28 443 iics1 >>> 2020/08/07 11:46:26 Endpoint connected: id: iics1
- Now, type “use” command to connect to the end point.
>>> use iics1 (iics1) >>>
- Now add tunnel to forward the traffic through server IP by using this command.
- addtunnel remote <listener Port> <destination IP> <destination port> <file name>
- Verify the tunnel added by using this command “listtunnels”
(iics1) >>> listtunnels Tunnel ID: iics
- Now, if we browser in our search engine, the traffic will travel from server IP. For this we can capture the traffic through Wireshark.
- In the above picture, we see the packet travelling through server IP Address.
We saw on how to make a secure connection between server and client for communicating with each other using tunneling process.
RSU is security enthusiast who has been constantly keeping world update about the new happening in Cyber Security Area. He is passionate in Cyber Security and wanted excel in this area with his hard work and dedication.