Answer the question
In order to leave comments, you need to log in
How to track users who use ssh port forward for port scanning?
For example, the ssh user created a dynamic socket, like
ssh -D 1080 remote.host
And then launched it on the local machine, for example, something like this
nmap host --proxy socks4://127.0.0.1:1080
Is there an option to track and stop such things?
Answer the question
In order to leave comments, you need to log in
there is an option directly on demand
https://man.openbsd.org/sshd#no-port-forwarding
i.e. enter this option into authorized_keys by the necessary user and any portforwarding is broken by it :)
i.e. at the beginning of the format line in it,
ssh-rsa AB*****123== [email protected]
enter
no-port-forwarding ssh-rsa AB*****123== [email protected]
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question