Use the SSH to build up the tunnel access to other computer can make the communication encrypted and secured, tested on the http service by using the SSH tunnel access, 1, use the wireshark to capture the data without the SSH tunnel, host
Use the SSH to build up the tunnel access to other computer can make the communication encrypted and secured, tested on the http service by using the SSH tunnel access,
The data can be viewed,
2, build up the SSH tunnel
needs to input the password
4, use the wireshark to capture the data with SSH tunnel, encrypted, cannot be viewed.
captured data:
Follow TCP Stream:
查看更多关于LinuxSSHtunnelaccesstest的详细内容...
声明:本文来自网络,不代表【好得很程序员自学网】立场,转载请注明出处:http://haodehen.cn/did94553