top of page
Search

AppleScript To Enable SOCKS Proxy On Mac OS X

  • amigil2
  • Aug 20, 2023
  • 2 min read


The other days I stayed at a hotel with wireless, and I wanted to use a SOCKS proxy (ssh) for accessing machines inside my company network and also for security: the hotel does not need to know what I am looking at. I have two locations set up with and without proxy. I needed a no-proxy location to enter the password for the wireless access, but when thereafter switching to the proxy location, Airport disconnected and reconnected, and the hotel's system required me to enter my password again, but for doing that I needed the no-proxy location. Argh! So the only way was going into System Preferences and toggle the proxy on/off.This hint enables me to automise the process, always toggling the proxy on before starting ssh to create the socks proxy.While I am not using the applescript solution this pointed me to the networksetup utility. Big thank you for that! And I confirm that that utility also works in Snow Leopard.Thanks!




AppleScript to enable SOCKS proxy on Mac OS X



Adversaries may use a connection proxy to direct network traffic between systems or act as an intermediary for network communications to a command and control server to avoid direct connections to their infrastructure. Many tools exist that enable traffic redirection through proxies or port redirection, including HTRAN, ZXProxy, and ZXPortMap. [1] Adversaries use these types of proxies to manage command and control communications, reduce the number of simultaneous outbound network connections, provide resiliency in the face of connection loss, or to ride over existing trusted communications paths between victims to avoid suspicion. Adversaries may chain together multiple proxies to further disguise the source of malicious traffic.


I want to always be able to securely connect to my Mac Book Pro anywhere in the world. The following guide will enable me to connect to the laptop if I leave it at home, leave it at work, or in the unfortunate event that someone steals it and the thief defeats File Vault full disk encryption. This phone home technique will work as long as the laptop can create an outgoing ssh connection. It will work behind NAT routers, but probably not behind strong corporate firewalls that only allow web proxy traffic out (something like corkscrew could help with this if you need it). 2ff7e9595c


 
 
 

Recent Posts

See All

Comments


join our mailing list

Thanks for submitting!

© 2023 by Closet Confidential. Proudly created with Wix.com

bottom of page