Details about Kpn Tunnel Revolution App

Main Injector

Base Payload: Use this to customize/replacement/full-changed incomming HTTP Request with/not Headers type and field from built-in SSH Tunnel or for other tunnel client. For replacement guides you can see Payload Commands on below.

SSL Payload: Use this to customize/replacement/full-changed incomming HTTP Request with/not Headers type and field from built-in SSH Tunnel or for other tunnel client to directly in ssl destination server. For replacement guides you can see Payload Commands on below.



Spoof Server: Use this to create fake identification of destination ssl server. :PEACE (V): we make this features for not a criminal activity, just for more protect for client to use this app from hacker to attacking the real ip server address (See: KPN Software Developers Licence).

Remote Server: Use this to use http(s) squid proxy or proxy from isp to establish connection your built-in SSH Tunnel or for other Tunnel client through it.



Proxy Type: Use to select redirect mode of socket type: 



Direct Proxy: Use this for full directing client to used cuztomize socket (No SSL/TLS).

Direct SSL/TLS: Use this for full directing client to used customize ssl-socket, (make sure the server destination must be support ssl socket. tested on ssh server over/directed by stunnel server mode).

HTTP Proxy: Use this for use HTTP Squid Proxy / ISP Proxy to established built-in SSH Tunnel or for other Tunnel client through it (No SSL/TLS).

SSL/TLS Proxy: Use this for use HTTP Squid Proxy / ISP Proxy with/secured by SSL/TLS Server to established built-in SSH Tunnel or for other Tunnel client through it. Tested on squid server over/directed by stunnel server mode.

SSL/TLS Proxy > HTTP Proxy: Use this to connect the SSH Server or other Tunnel Client with secure SSL/TLS over HTTP Squid Proxy / ISP Proxy (No SSL/TLS) to established built-in SSH Tunnel or for other Tunnel client through it (with SSL/TLS), Tested on SSH Server over/directed by Stunnel Server over HTTP Squid Server (No SSL/TLS). NOTE: make sure the response header from HTTP squid/isp proxy is cleaned by Response Correction counter, if not clean/stuck you can adjust the counter number Response Correction in Advanced SSL Settings Menu or SSL Handshaking never/failed and you nerver/failed to connect. keep in mine to use this feature.



Local Port: Use this to use this injector function over localhost:port, in built-in SSH Tunnel you just check SSH Tunnel in Settings. If you use other Tunnel Client make sure to use HTTP Proxy with address 127.0.0.1:your_local_port (for OpenVpn see on bellow this page).


Payload Commands

[real_raw] or [realData] : Real Request data from Client. this command contain with double CR LF ( \r\n ) / Newline. Example : "[real_raw]" (normaly use), with Front Inject : "HEAD http://bughost.com/ HTTP/1.1\r\nHost: bughost.com\r\n\r\n". [real_raw]" . with Back Inject : "[real_raw]HEAD http://bughost.com/ HTTP/1.1\r\nHost: bughost.com\r\n\r\n".

[raw] or [netData] : Request data from the Client. this command not contain with double CR LF ( \r\n ) / Newline . for normaly use, you must add Double CR LF ( \r\n ) / Newline after [raw] command . Example : "[raw]\r\n\r\n" (normal used). with Front Inject : "HEAD http://bughost.com/ HTTP/1.1\r\nHost: bughost.com\r\n\r\n[raw]\r\n\r\n" . with Back Inject : "[raw]\r\n\r\nHEAD http://bughost.com/ HTTP/1.1\r\nHost: bughost.com\r\n\r\n".

[method] : Methods of Request Data command from the Client.. if you using SSH, OpenVPN, or other tunnel application default method is "CONNECT". Example : "[method] sshserver:443 HTTP/1.0\r\n\r\n".

[host_port] : Server Destination with Open Port Server Destination from the Client (Mix in). Example : Normaly "[method] [host_port] HTTP/1.0\r\n\r\n". with Front Query : "[method] bughost.com@[host_port] HTTP/1.0\r\n\r\n". with Back Query : "[method] [host_port]@bughost.com HTTP/1.0\r\n\r\n".

[host] and [port] : [host] is Server Destination and [port] Open Port Server Destination. This command can be used to Middle Query methods. Example : "[method] [host]@bughost.com:[port] HTTP/1.1\r\n\r\n".

[protocol] : HTTP Request Version Protocol (HTTP/0.9 or HTTP/1.0 or HTTP/1.1) in Request data from Client. Example : "[method] [host_port] [protocol]\r\n\r\n".

[split] : Spliting request header, the header of each request, which is between the command "[split]" will be sent to the server independently. Example : [raw]\r\n\r\n[split]POST http://bughost.com/ HTTP/1.1\r\nHost: bughost.com\r\n\r\n".

[split_delay] or [split_delay=n] : Spliting request header, the header of each request, which is between the command "
[split_delay]" will be sent to the server independently with delayed time (1s). Example : [raw]\r\n\r\n[split_delay]POST http://bughost.com/ HTTP/1.1\r\nHost: bughost.com\r\n\r\n" or set delayed time with "[split_delay=time_by_second] Example : [raw]\r\n\r\n[split_delay=5]POST http://bughost.com/ HTTP/1.1\r\nHost: bughost.com\r\n\r\n".



[cr] : Carriage Return (\r) is a Newline of HTTP Header Fields and Support multiple line. Example 1 : [method] [host_port] [protocol][cr]Host: [host_port][cr][cr] or use Simple Multiplelines : [method] [host_port] [protocol][cr]Host: [host_port][cr*2] .

[lf] : Line Feed (\n) is a Newline of HTTP Header Fields and Support multiple line. Example 1 : [method] [host_port] [protocol][lf]Host: [host_port][lf][lf] or use Simple Multiplelines : [method] [host_port] [protocol][lf]Host: [host_port][lf*2] .

[crlf] : Combined Carriage Return and Line Feed (\r\n) and Support multiple line. Example 1 : [method] [host_port] [protocol][crlf]Host: [host_port][crlf][crlf] or use Simple Multiplelines : [method] [host_port] [protocol][crlf]Host: [host_port][crlf*2] .

[lfcr] : Combined Line Feed and Carriage Return (\n\r) and Support multiple line. Example 1 : [method] [host_port] [protocol][lfcr]Host: [host_port][lfcr][lfcr] or use Simple Multiplelines : [method] [host_port] [protocol][lfcr]Host: [host_port][lfcr*2] .

[auth] : Basic of Authentication for Remote Server (if needed), to working this command, fill Username and Password in Remote Server. (your_proxy_or_host:your_port@your_username:your_password). ex : [raw][crlf]Proxy-Authorization: [auth][crlf*2] .

[ua] : Device User Agent string. ex : [raw][crlf]User-Agent: [ua][crlf*2] .

[random] or [random==1;2;3;etc] : Send payloads by randomly if Started Service or Reconnecting. Example : [raw]\r\n\r\n[random][raw]\r\nConnection: keep-alive\r\n\r\n[random][raw]\r\nProxy-Connection: keep-alive\r\n\r\n or Simplify Example : CONNECT [random=example.com;example2.com;example3.com] HTTP/1.0\r\nHost: [random=example.com;example2.com;example3.com]\r\n\r\n.

[repeat] : Send payloads ordinaly and rotate payload on Reconnecting, reset index on Stoped Service. Example : [raw]\r\n\r\n[repeat][raw]\r\nConnection: keep-alive\r\n\r\n[repeat][raw]\r\nProxy-Connection: keep-alive\r\n\r\n .

[rotate=1;2;3;etc] : Send payloads ordinaly and rotate payload on Reconnecting by list of host input (Simple version for [repeat] but only host with same payload constructor), reset index on Stoped Service. Example : CONNECT [rotate=example.com;example2.com;example3.com] HTTP/1.0\r\nHost: [rotate=example.com;example2.com;example3.com]\r\n\r\n.



Extra Commands : Enter keyboard, \r and \n.

Use your imagination to fill the payload. Or learn about the HTTP request before.


Configure OpenVPN

In OpenVPN Config File : add new line : "route 0.0.0.0 0.0.0.0 vpn_gateway", add new line : "route YOUR-PROXY 255.255.255.255 net_gateway" and add newline again "http-proxy 127.0.0.1 2323". 




Source : Kpn Tunnel Revolution App
You can download the application here.

0 comments:

Post a Comment