0

What are the major vulnerabilities of allowing/utilizing SOCKS5 backconnect connections?

I am familiar with SOCKS5 SSH tunnels (e.g., ssh -N -D 8080 [email protected] -p 22). I am trying to consider what additional vulnerabilities we are opening our network to if we use backconnect connections rather than traditional outbound SSH tunnels.

It seems that a backconnect connection type is similar to the way we used to set up remote access tunnels (i.e., PCAnywhere). Is that the right way to think about how backconnect connections work? Is this generalization (backconnect = RAT) reasonable?

Network namespaces are useful for creating virtual/real network isolation. Are there any clever ways to use two IP range networks to somehow allow a local client to SSH to a locally segregated backconnect connection network?

0

You must log in to answer this question.

Start asking to get answers

Find the answer to your question by asking.

Ask question

Explore related questions

See similar questions with these tags.