Bypassing Cisco Umbrella with SSH Tunneling
There was a need to bypass Cisco Umbrella. Machine A (MA) was a locked down enterprise AD device. During a Pen Test I discovered a URL that suggested it should be hidden from the public. Navigating to it on MA’s browser resulted in the site being blocked by Cisco Umbrella. I didn’t have any quick access to any VPNs and needed to see what was on this URL.
I have a local machine (LM) but I didn’t want to expose my personal IP.
Learned about ngrok from the GCPN class. It’s port forwarding as-a-service (free or paid).
Turned on VPN to hide my local IP
Check LM for SSH Server.
sudo systemsetup -getremotelogin
If off, turn on SSH Server.
sudo systemsetup -setremotelogin on
Port forward LM port 22 to the internet.
ngrok 22 tcp
On MA start an SSH tunnel. Setting up using dynamic port forwarding aka a socks proxy which means multiple protocols can pass through one port.
ssh -D 1080 -N -f -C -q username@your-mac-ip
I used Mozilla Firefox on WSL and for some reason couldn’t open settings so I went the tab editing route.
about:config
Find these settings and replace them with local host and the port we used in step 5 (1080)
network.proxy.type 1
network.proxy.socks 127.0.0.1
network.proxy.socks_port 1080
network.proxy.socks_version 5
network.proxy.http 127.0.0.1
network.proxy.http_port 1080
Checking whats my IP website shows my VPN so looks like it worked. I was able to hit the URL and find internal client files which is a finding.