Easy Port Forwarding using SSH

Easy Port Forwarding using SSHSometime we need to run our localhost website or server over internet. To do this we need to forward our port that other device can access our website from anywhere in the world by internet. Usually we can forward our port by configuring settings in router, but if we don't have router or don't wanna use our router or not have static ip, then we have a very easy option. We can remotely forward port using SSH.

SSH port Forward
Image Copyright:  SRU Computer Science


To do this we use a free service called serveo.net and localhost.run. This requires no installation and no sign-up. Serveo is a SSH server. Whenever a user connects to this service they got a public URL that URL can be use to connect to their localhost server.

We are in our Kali Linux system. Here we have a website in php. We can use a html file also.

ls command in kali linux

Now we set this in our localhost. For this we check our local ip by using following command:

ifconfig
The screenshot of our local ip is following :

ifconfig in kali linux

Here we start a basic web server using php by using following command:

php -S 192.168.10.100:80
Here the 192.168.10.100 is our local ip and we run this server in port 80. The screenshot of the command is following:

php server localhost

Here we need to remember that we must run this server in the directory where we saved the php/html file. We have successfully started our website or web server in our local network. Let we check this by typing our local ip and port in browser. The screenshot is following :

demo localhost website

We can see in the screenshot that URL is our local ip. That means it is hosted in localhost. Now we want to access our website outside of our network that means from anywhere via internet.

We minimize the terminal window (Don't close this terminal, because it's running our server) and open another new terminal window to run SSH.

The Serveo Method


For this we apply following command:

ssh -R 80:192.168.10.100:80 serveo.net
Here 80 is our port and we are using ssh using serveo.net service.

Then we can see that our localhost is forwarding in a unique URL, as following screenshot.

serveo.net tutorial

Now we can access our localhost by using this URL. Copy this URL and paste it in the address bar of browser in any devices and see the magic.

SSH port forwarding tutorial


It's done. But wait serveo have some other features.

We can request serveo to get back our old URL. If it is free then serveo will assign it for us again.


We have a old serveo connection with lente.servo.net. We try to get it again. So we request for that subdomain by using following command:

ssh -R lente:80:192.168.10.100:80 serveo.net

getting old domain

Here we got that subdomain. Now we can access our localhost with this older URL.

If we want to forward random port then our first port fiels in command will be 0. like following command:

ssh -R 0:192.168.10.100:80 serveo.net
The screenshot of this command is following :

serveo random port

We can open our website with serveo.net:our_assigned_port from anywhere.
In the following screenshot we have opened this link in our mobile device.

port forward from mobile


Using Localhost.run Method

Well it is almost similar to serveo.net then why we adding this? Because these free services sometimes goes down during overload on the server. If one service is not working then we can try another. So we can use it by applying following command:

ssh -R 80:192.168.10.100:80 ssh.localhost.run
If it prompt for RSA fingerprint we type yes and press enter.


port forwarding using SSH localhost.run method

We got the shareable link in the last line, we can use this link to connect ssh.

That's it. Using this method we can forward port without VPN or router. This is so easy to configure it and the connection is stable unlike ngrok, ngrok is not much stable in free version.


Suraj Virus

comprehensive information on Ethical Hacking Tutorial, Computer science, Cloud Computer, Programming Languages ,Networking Computer Forensics ...

Post a Comment

Previous Post Next Post