Main Injector
Base Payload: Use this to customize/replacement/full-changed incomming HTTP Request with/not Headers type and field from built-in SSH Tunnel or for other tunnel client. For replacement guides you can see Payload Commands on below.
SSL Payload: Use this to customize/replacement/full-changed incomming HTTP Request with/not Headers type and field from built-in SSH Tunnel or for other tunnel client to directly in ssl destination server. For replacement guides you can see Payload Commands on below.
Spoof Server: Use this to create fake identification of destination ssl server. :PEACE (V): we make this features for not a criminal activity, just for more protect for client to use this app from hacker to attacking the real ip server address (See: KPN Software Developers Licence).
Remote Server: Use this to use http(s) squid proxy or proxy from isp to establish connection your built-in SSH Tunnel or for other Tunnel client through it.
Proxy Type: Use to select redirect mode of socket type:
Direct Proxy: Use this for full directing client to used cuztomize socket (No SSL/TLS).
Direct SSL/TLS: Use this for full directing client to used customize ssl-socket, (make sure the server destination must be support ssl socket. tested on ssh server over/directed by stunnel server mode).
HTTP Proxy: Use this for use HTTP Squid Proxy / ISP Proxy to established built-in SSH Tunnel or for other Tunnel client through it (No SSL/TLS).
SSL/TLS Proxy: Use this for use HTTP Squid Proxy / ISP Proxy with/secured by SSL/TLS Server to established built-in SSH Tunnel or for other Tunnel client through it. Tested on squid server over/directed by stunnel server mode.
SSL/TLS Proxy > HTTP Proxy: Use this to connect the SSH Server or other Tunnel Client with secure SSL/TLS over HTTP Squid Proxy / ISP Proxy (No SSL/TLS) to established built-in SSH Tunnel or for other Tunnel client through it (with SSL/TLS), Tested on SSH Server over/directed by Stunnel Server over HTTP Squid Server (No SSL/TLS). NOTE: make sure the response header from HTTP squid/isp proxy is cleaned by Response Correction counter, if not clean/stuck you can adjust the counter number Response Correction in Advanced SSL Settings Menu or SSL Handshaking never/failed and you nerver/failed to connect. keep in mine to use this feature.
Payload Commands
[real_raw] or [realData] : Real Request data from Client. this command contain with double CR LF ( \r\n ) / Newline. Example : "[real_raw]" (normaly use), with Front Inject : "HEAD http://bughost.com/ HTTP/1.1\r\nHost: bughost.com\r\n\r\n". [real_raw]" . with Back Inject : "[real_raw]HEAD http://bughost.com/ HTTP/1.1\r\nHost: bughost.com\r\n\r\n".
[raw] or [netData] : Request data from the Client. this command not contain with double CR LF ( \r\n ) / Newline . for normaly use, you must add Double CR LF ( \r\n ) / Newline after [raw] command . Example : "[raw]\r\n\r\n" (normal used). with Front Inject : "HEAD http://bughost.com/ HTTP/1.1\r\nHost: bughost.com\r\n\r\n[raw]\r\n\r\n" . with Back Inject : "[raw]\r\n\r\nHEAD http://bughost.com/ HTTP/1.1\r\nHost: bughost.com\r\n\r\n".
[method] : Methods of Request Data command from the Client.. if you using SSH, OpenVPN, or other tunnel application default method is "CONNECT". Example : "[method] sshserver:443 HTTP/1.0\r\n\r\n".
[host_port] : Server Destination with Open Port Server Destination from the Client (Mix in). Example : Normaly "[method] [host_port] HTTP/1.0\r\n\r\n". with Front Query : "[method] bughost.com@[host_port] HTTP/1.0\r\n\r\n". with Back Query : "[method] [host_port]@bughost.com HTTP/1.0\r\n\r\n".
[host] and [port] : [host] is Server Destination and [port] Open Port Server Destination. This command can be used to Middle Query methods. Example : "[method] [host]@bughost.com:[port] HTTP/1.1\r\n\r\n".
[protocol] : HTTP Request Version Protocol (HTTP/0.9 or HTTP/1.0 or HTTP/1.1) in Request data from Client. Example : "[method] [host_port] [protocol]\r\n\r\n".
[split] : Spliting request header, the header of each request, which is between the command "[split]" will be sent to the server independently. Example : [raw]\r\n\r\n[split]POST http://bughost.com/ HTTP/1.1\r\nHost: bughost.com\r\n\r\n".
[split_delay] or [split_delay=n] : Spliting request header, the header of each request, which is between the command "
[split_delay]" will be sent to the server independently with delayed time (1s). Example : [raw]\r\n\r\n[split_delay]POST http://bughost.com/ HTTP/1.1\r\nHost: bughost.com\r\n\r\n" or set delayed time with "[split_delay=time_by_second] Example : [raw]\r\n\r\n[split_delay=5]POST http://bughost.com/ HTTP/1.1\r\nHost: bughost.com\r\n\r\n".
[cr] : Carriage Return (\r) is a Newline of HTTP Header Fields and Support multiple line. Example 1 : [method] [host_port] [protocol][cr]Host: [host_port][cr][cr] or use Simple Multiplelines : [method] [host_port] [protocol][cr]Host: [host_port][cr*2] .
[lf] : Line Feed (\n) is a Newline of HTTP Header Fields and Support multiple line. Example 1 : [method] [host_port] [protocol][lf]Host: [host_port][lf][lf] or use Simple Multiplelines : [method] [host_port] [protocol][lf]Host: [host_port][lf*2] .
[crlf] : Combined Carriage Return and Line Feed (\r\n) and Support multiple line. Example 1 : [method] [host_port] [protocol][crlf]Host: [host_port][crlf][crlf] or use Simple Multiplelines : [method] [host_port] [protocol][crlf]Host: [host_port][crlf*2] .
[lfcr] : Combined Line Feed and Carriage Return (\n\r) and Support multiple line. Example 1 : [method] [host_port] [protocol][lfcr]Host: [host_port][lfcr][lfcr] or use Simple Multiplelines : [method] [host_port] [protocol][lfcr]Host: [host_port][lfcr*2] .
[auth] : Basic of Authentication for Remote Server (if needed), to working this command, fill Username and Password in Remote Server. (your_proxy_or_host:your_port@your_username:your_password). ex : [raw][crlf]Proxy-Authorization: [auth][crlf*2] .
[ua] : Device User Agent string. ex : [raw][crlf]User-Agent: [ua][crlf*2] .
[random] or [random==1;2;3;etc] : Send payloads by randomly if Started Service or Reconnecting. Example : [raw]\r\n\r\n[random][raw]\r\nConnection: keep-alive\r\n\r\n[random][raw]\r\nProxy-Connection: keep-alive\r\n\r\n or Simplify Example : CONNECT [random=example.com;example2.com;example3.com] HTTP/1.0\r\nHost: [random=example.com;example2.com;example3.com]\r\n\r\n.
[repeat] : Send payloads ordinaly and rotate payload on Reconnecting, reset index on Stoped Service. Example : [raw]\r\n\r\n[repeat][raw]\r\nConnection: keep-alive\r\n\r\n[repeat][raw]\r\nProxy-Connection: keep-alive\r\n\r\n .
[rotate=1;2;3;etc] : Send payloads ordinaly and rotate payload on Reconnecting by list of host input (Simple version for [repeat] but only host with same payload constructor), reset index on Stoped Service. Example : CONNECT [rotate=example.com;example2.com;example3.com] HTTP/1.0\r\nHost: [rotate=example.com;example2.com;example3.com]\r\n\r\n.
Extra Commands : Enter keyboard, \r and \n.
Use your imagination to fill the payload. Or learn about the HTTP request before.
Configure OpenVPN
In OpenVPN Config File : add new line : "route 0.0.0.0 0.0.0.0 vpn_gateway", add new line : "route YOUR-PROXY 255.255.255.255 net_gateway" and add newline again "http-proxy 127.0.0.1 2323".
Source : Kpn Tunnel Revolution App
You can download the application here.
0 comments:
Post a Comment