Reverse SSH Tunneling

In this tutorial we will covering how to bypass these restrictions using a technique called Rerverse SSH Tunneling.
Note: This tutorial assumes you are using Ubuntu. The steps however are expected to work for other Linux distribution.

  • An Ubuntu server instance.
  • A SSH Client on your local machine.
Step 1: Configuring SSH daemon on your server:
By default, SSH daemon is only listening on, so we won’t be able to access to our forwarded ports from outside. To get it listen on the interface connected to Internet we must enable GatewayPorts option in SSH server's configuration.

Open /etc/ssh/sshd_config using your favorite text editor.
nano /etc/ssh/sshd_config
Then add GatewayPorts yes at the bottom of the file.
After saving the file, restart the SSH daemon:
service ssh restart
Step 2: Tunneling:
If your home computer runs Linux, you’ll need to use the ssh command as follows:
ssh -R [Port to forward to on your VPS]:localhost:[Port to forward on your local machine] [VPS IP]
Or if you have installed Microsoft Windows on your machine then you have to install plink and connect as shows below:
plink -R [Port to forward to on your VPS]:localhost:[Port to forward on your local machine] [VPS IP]
In this example, we’re forwarding port 19132 which is open on your at-home machine to port 80 on your remote server (assuming your server's IP Address is
ssh -R 80:localhost:19132
This will allow you to access your at-home machine from a remote location by connecting to

About Author:

I am a Linux Administrator and Security Expert with this site i can help lot's of people about linux knowladge and as per security expert i also intersted about hacking related news.TwitterFacebook

Newer Post
Older Post


Post a Comment