Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

TCP Tunneling Applications - Pros and Cons Explained by Example

Hussein Nasser via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of TCP tunneling in this comprehensive 30-minute video lecture. Delve into the process of encapsulating content from one protocol into another, typically used when the original protocol is blocked or unavailable. Learn how TCP tunneling works through practical examples, including accessing blocked websites and creating secure connections. Discover various applications such as VPNs, securing insecure connections, achieving anonymity, and bypassing firewalls. Examine different types of tunneling, including local port forwarding, SOCKS proxy, and reverse tunneling. Analyze the pros and cons of TCP tunneling, discussing security benefits and potential performance issues like TCP meltdown. Compare TCP and UDP, explore the OSI model, and understand the differences between private and public IP addresses, proxies, and reverse proxies. Gain insights into TLS and various tunneling techniques to enhance your networking knowledge.

Syllabus

You create a legit tcp connection over a known protocol such as SSH between you and Server1. You then create a tcp packet that is intended for Sever2 so you tag it with Server. Then you package that packet into another TCP packet intended for Server1! Huh ! Server1:22. You then forward the packet over, your ISP police will see that there is a packet intended to Server1 on port 22. Proxy approves and forwards it over not knowing that you are smuggling content in that packet. Also the proxy cant even look in the content because its encrypted with RSA. Server1 unpacks the package, decrypt and discover that its an other tcp packet. Here is where the shady stuff happen. Server1 now looks and see that the smuggled package is intended for Server, created a connection and delivers the package it, it changes the source ip to its self and keeps track somehow of that. Once it receives the package it knows that this package has to go back to tunnel. The client now have access to the blocked site! What does this look like guys? Yes you guessed it its a VPN.
TCP VS UDP
OSI model
private vs public ip
proxy vs reverse proxy
TLS
local
reverse
socks

Taught by

Hussein Nasser

Reviews

Start your review of TCP Tunneling Applications - Pros and Cons Explained by Example

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.