Dynamic SSH will be required to tunnel traffic via SSH through a server
dynamic port forward ssh -D 127.0.0.1:<local_proxy_port> user@<remote_server_ip> - password based auth
ssh -D 127.0.0.1:<local_proxy_port> -i config_file - key based auth
-D for dynamic port forward local_proxy_port - port opened on my system for proxying Will be using this as proxy in Burp
Running command line tools via SSH proxy
Edit the configuration file, /etc/proxychains4.conf, and give the details of the SOCKS5 proxy on the dynamic SSH tunnel.
[ProxyList] socks5 127.0.0.1 <local_proxy_port>
use proxychains command before any command line tool to run the command through proxy
eg: proxychains nmap (options)
Running burp via SSH proxy
prxyhost: 127.0.0.1 proxyport <local_proxy_port>
check use SOCKS proxy and start using as usual Do DNS lookup over SOCKS in case the site doesn’t load.