![Offensive Security Guide to SSH Tunnels and Proxies | by Russel Van Tuyl | Posts By SpecterOps Team Members Offensive Security Guide to SSH Tunnels and Proxies | by Russel Van Tuyl | Posts By SpecterOps Team Members](https://miro.medium.com/max/1400/1*MfiCfsgFdW7tiEv6BFJAvA.png)
Offensive Security Guide to SSH Tunnels and Proxies | by Russel Van Tuyl | Posts By SpecterOps Team Members
![Sample setup for the target servers located behind a SOCKS proxy server - Documentation for TrueSight Server Automation 21.3 - BMC Documentation Sample setup for the target servers located behind a SOCKS proxy server - Documentation for TrueSight Server Automation 21.3 - BMC Documentation](https://docs.bmc.com/docs/serverautomation/213/files/1013436787/1013436788/1/1624531971191/SOCKSSetUp.png)
Sample setup for the target servers located behind a SOCKS proxy server - Documentation for TrueSight Server Automation 21.3 - BMC Documentation
![Secure browsing using a local SOCKS proxy server (on desktop or mobile) and an always free OCI compute instance as SSH server Secure browsing using a local SOCKS proxy server (on desktop or mobile) and an always free OCI compute instance as SSH server](https://technology.amis.nl/wp-content/uploads/2020/02/oracle-cloud-ssh-socks-proxy.png)