Port forwarding services
In the ever-evolving world of cybersecurity, understanding how to port forward and expose ports to the internet can be a powerful tool for ethical hackers and security enthusiasts. Whether you're testing the security of your own network, exploring penetration testing techniques, or experimenting with various applications, mastering port forwarding is crucial. In this blog, we’ll delve into a curated list of tools specifically designed to help you port forward and expose ports effectively for various purposes.
LocalTunnel
Install Localtunnel globally (requires NodeJS) to make it accessible anywhere:
npm install -g localtunnel
Start a webserver on some local port (eg http://localhost:8000) and use the command line interface to request a tunnel to your local server:
lt --port 8000
Features
- Secure https for all tunnels
- Show your work to anyone
- Use the API to test webhooks
- Test your UI in cloud browsers
LoopHole
Create account or login
Firstly, open your favorite terminal and change directory to the place you downloaded loophole. To authenticate your CLI, execute
and follow the instructions on your screen to complete the login.$ loophole account login
Run it
To start an HTTP tunnel on port 3000, execute this next:
$ loophole http 3000
Supported Functionalities
- Expose local HTTP server
- Expose HTTP server running on any machine in your network
- Expose local directory via HTTPS
- Expose local directory via WebDav
- Basic Auth
Pinggy
Create HTTP, TCP, UDP, or TLS tunnels to your Mac/PC. Even if it is sitting behind firewalls and NATs. Free mode offers
- Single command tunneling
- HTTP(S), TCP, UDP, TLS tunnels
- Live header manipulation
- Request-response inspection & replays
- 60 minutes tunnel timeout
- Random subdomains
- Restricted bandwidth and connections
Pinggy needs no additional downloads. It utilises traditional ssh to forward ports.
ssh -p 443 -R0:localhost:8080 -L4300:localhost:4300 qr@a.pinggy.io
LocalTunnel
localtunnel exposes your localhost to the world for easy testing and sharing
Installation
npm install -g localtunnel
When localtunnel is installed globally, just use the lt command
lt --port 8000
OnionPipe
Onion addresses for anything. Onionpipe
forwards ports on the local host to remote Onion addresses as Tor hidden services and vice-versa.
onionpipe 8000
LocaltoNet
LocaltoNet is a reverse proxy that enables you to expose your localhost services to the internet.
Free plan offers:
- 1 HTTP/TCP/UDP Tunnels
- 1 GB Bandwidth
- Load Balancing
- Basic Authentication
- APIs for Tunnels
- Request Inspection & Modify
- Automated SSL/TLS Certificates
- Unlimited Connections
- No Timeout
Zrok
Use zrok
to share a running service, like a web server or a network socket, or to share a directory of static files. You can reserve a subdomain, enable authentication options, or both. Public shares proxy HTTPS to your service or files.
TunnelMole
Tunnelmole is a simple tool to give your locally running HTTP(s) servers a public URL. For example, you could get a public URL for
- A web server
- A Docker container
- An API
- A React or node application
- A static website
sudo npm install -g tunnelmole
tmole 8080 http://evgtkh-ip-49-145-166-122.tunnelmole.net is forwarding to localhost:8080 https://evgtkh-ip-49-145-166-122.tunnelmole.net is forwarding to localhost:8080
Comments off