wildfire05
Honorary Poster
- Joined
- Jun 1, 2016
- Posts
- 889
- Reaction
- 302
- Points
- 247
Injection system for free internet using HTTP INJECTOR
I will use HTTP Injector to experiment how to make config HTTP Injector. If you can understand in this tut, your can be make a config for HTTP injector and same application. Only slightly different but same mean
Method, there are a lot of methods but that is often used is
- GET
- HEAD
- POST
- DELETE
- TRACE
- CONNECT
- etc
Average - using GET or HEAD
Line, there are four types of line that can be used are:
[Cr] = Carriage Return, U + 000D
[Lf] = Line Feed, U + 000A
[Crlf] = CR (U + 000D) followed by LF (U + 000A)
[Lfcr] = LF (U + 000A) followed by CR (U + 000D)
[Crlf] [crlf] = To indicate the end of the HTTP header
Average - Averrage use [CRLF]
Protocol version there are three
- HTTP/2.0
- HTTP/1.1
- HTTP/1.0
HTTP/1.1 usuall in BUG while HTTP/1.0 the protocol to SSH. Depending on the type
Connection Typethere are two
[realData] = connection at the end to have a 2 LINE [crlf][crlf]
For example, if using SSH = CONNECT ipssh: portssh HTTP/1.0[crlf][crlf]
Depending on the type of connection
[NetData] = connection at the end DO NOT HAVE LINE. And fortunately usually used to add other payload such as Host: bug.com, Connection: Kee-Alive, etc.
For example, if using SSH = CONNECT ipssh: portssh HTTP/1.0
And if it was followed by the BUG then = CONNECT ipssh: ortssh HTTP/1.0[crlf]Host: bug.com [crlf][crlf]
Depending oon the type of connection. And if in follow Bug then adden 1 new LINE followed BUG and ends 2 LINE
Method Inject divided into 3 types:
- Normal
- Front Inject
- Back Inject
- Front Query
- Back Query
The contents of the request to be sent
- Normal
Which means that the connection is placed at the beginning and then followed by the bug payload with 1 LINE [crlf]
Example 1 = [netData][crlf]Host: bug.com[crlf][crlf]
OR
Example 2 = CONNECT ipssh: portssh HTTP/1.0[crlf] Host: bug.com[crlf][crlf]
Green = SSH connections consist of METHOD ip and port with protocol version HTTP / 1.0
Line = [crlf]
Red = Bug
- Front Inject front means
So the bug was placed in front of the next follow connection (ssh / vpn / direct it depends)
Example 1 = GET You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1[crlf]Host: bug.com[crlf][crlf][realData]
OR
Example 2 = GET You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1[crlf]Host: bug.com[crlf][crlf]CONNECT ipssh: portssh HTTP/1.0[crlf][crlf]
Method = GET
Red = Bug
Protocol version = HTTP/1.1
Line = [crlf]
Blue = connection
- Back meaning behind
So the first connection (ssh / vpn / direct dependent) then follow bug
Example 1 = [realData]GET You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1[crlf]Host: bug.com[crlf][crlf]
OR
Example 2 = CONNECT ipssh: portssh HTTP/1.0[crlf][crlf]GET You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1[crlf]Host: bug.com[crlf][crlf]
Blue = connection
Method = GET
Red = Bug
Protocol version = HTTP/1.1
Line = [crlf]
- Front Query
This means that there are bugs that slipped in front of the connection later in the end @
Example = CONNECT query.com@ipssh: portssh HTTP/1.0[crlf][crlf]GET You do not have permission to view the full content of this post. Log in or register now.HTTP/1.1[crlf]Host: bug.com[crlf][crlf]
Blue = connection
Black= Query
Method = GET
Red = Bug
Protocol version = HTTP/1.1
Line = [crlf]
Query usually the same as the bug itself
- Back Query
This means that there Bug tucked behind a connection that begins @
Example = CONNECT ipssh: portssh@query.com HTTP/1.0[crlf][crlf]GET You do not have permission to view the full content of this post. Log in or register now.HTTP/1.1[crlf]Host: bug.com[crlf][crlf]
Blue = connection
Black = Query
Method = GET
Red = Bug
Protocol version = HTTP/1.1
Line = [crlf]
Query usually the same as the bug itself
Replace
Replace is replacing a specific response in order to connect the bias current. And most often, namely replacing to 200 OK
Example Response =
- 302 to 200 OK Replace Found
- 400 Bad Request Replace to 200 OK
- Etc
Payload
There are many types of payload. Inject the start time may not appear too using payload. But because security is tight then we also need a payload.
example:
- Host: bug.com
- X-Online-Host: bug.com
- X-Forward-Host: bug.com
- X-Forwarded-For: bug.com
- Connection: Keep-Alive or Close
- Proxy-Connection: Keep-Alive or Close
- Content-Type: * / *
- Content-Length: 0 or 1024 or another one
- And many more
Proxy and Port
The use of proxy and proxy port could use the original operator.
Proxies can also use public or Squid Proxy from VPS with port 80/8000/8080/3128 / etc mouthful can be invited to the free internet.,
found this thread usefull?
if you learn more about http injector
just hit and run the like botton below
Credit to owner of this tutorial = PHC family
*extra info about http injector*
credit to mr. Anarchy
*Lesson 101: how to make a ehi for tnt with screenshots*
https://phcorner.net/t/lesson-101-h...t-with-screenshots.161718/page-8#post-1660638
*Lesson 101: proper pingging no dc http injector / eproxy using pingtools pro*
https://phcorner.net/t/lesson-101-p...p-injector-eproxy-using-pingtools-pro.158079/
I will use HTTP Injector to experiment how to make config HTTP Injector. If you can understand in this tut, your can be make a config for HTTP injector and same application. Only slightly different but same mean
Method, there are a lot of methods but that is often used is
- GET
- HEAD
- POST
- DELETE
- TRACE
- CONNECT
- etc
Average - using GET or HEAD
Line, there are four types of line that can be used are:
[Cr] = Carriage Return, U + 000D
[Lf] = Line Feed, U + 000A
[Crlf] = CR (U + 000D) followed by LF (U + 000A)
[Lfcr] = LF (U + 000A) followed by CR (U + 000D)
[Crlf] [crlf] = To indicate the end of the HTTP header
Average - Averrage use [CRLF]
Protocol version there are three
- HTTP/2.0
- HTTP/1.1
- HTTP/1.0
HTTP/1.1 usuall in BUG while HTTP/1.0 the protocol to SSH. Depending on the type
Connection Typethere are two
[realData] = connection at the end to have a 2 LINE [crlf][crlf]
For example, if using SSH = CONNECT ipssh: portssh HTTP/1.0[crlf][crlf]
Depending on the type of connection
[NetData] = connection at the end DO NOT HAVE LINE. And fortunately usually used to add other payload such as Host: bug.com, Connection: Kee-Alive, etc.
For example, if using SSH = CONNECT ipssh: portssh HTTP/1.0
And if it was followed by the BUG then = CONNECT ipssh: ortssh HTTP/1.0[crlf]Host: bug.com [crlf][crlf]
Depending oon the type of connection. And if in follow Bug then adden 1 new LINE followed BUG and ends 2 LINE
Method Inject divided into 3 types:
- Normal
- Front Inject
- Back Inject
- Front Query
- Back Query
The contents of the request to be sent
- Normal
Which means that the connection is placed at the beginning and then followed by the bug payload with 1 LINE [crlf]
Example 1 = [netData][crlf]Host: bug.com[crlf][crlf]
OR
Example 2 = CONNECT ipssh: portssh HTTP/1.0[crlf] Host: bug.com[crlf][crlf]
Green = SSH connections consist of METHOD ip and port with protocol version HTTP / 1.0
Line = [crlf]
Red = Bug
- Front Inject front means
So the bug was placed in front of the next follow connection (ssh / vpn / direct it depends)
Example 1 = GET You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1[crlf]Host: bug.com[crlf][crlf][realData]
OR
Example 2 = GET You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1[crlf]Host: bug.com[crlf][crlf]CONNECT ipssh: portssh HTTP/1.0[crlf][crlf]
Method = GET
Red = Bug
Protocol version = HTTP/1.1
Line = [crlf]
Blue = connection
- Back meaning behind
So the first connection (ssh / vpn / direct dependent) then follow bug
Example 1 = [realData]GET You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1[crlf]Host: bug.com[crlf][crlf]
OR
Example 2 = CONNECT ipssh: portssh HTTP/1.0[crlf][crlf]GET You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1[crlf]Host: bug.com[crlf][crlf]
Blue = connection
Method = GET
Red = Bug
Protocol version = HTTP/1.1
Line = [crlf]
- Front Query
This means that there are bugs that slipped in front of the connection later in the end @
Example = CONNECT query.com@ipssh: portssh HTTP/1.0[crlf][crlf]GET You do not have permission to view the full content of this post. Log in or register now.HTTP/1.1[crlf]Host: bug.com[crlf][crlf]
Blue = connection
Black= Query
Method = GET
Red = Bug
Protocol version = HTTP/1.1
Line = [crlf]
Query usually the same as the bug itself
- Back Query
This means that there Bug tucked behind a connection that begins @
Example = CONNECT ipssh: portssh@query.com HTTP/1.0[crlf][crlf]GET You do not have permission to view the full content of this post. Log in or register now.HTTP/1.1[crlf]Host: bug.com[crlf][crlf]
Blue = connection
Black = Query
Method = GET
Red = Bug
Protocol version = HTTP/1.1
Line = [crlf]
Query usually the same as the bug itself
Replace
Replace is replacing a specific response in order to connect the bias current. And most often, namely replacing to 200 OK
Example Response =
- 302 to 200 OK Replace Found
- 400 Bad Request Replace to 200 OK
- Etc
Payload
There are many types of payload. Inject the start time may not appear too using payload. But because security is tight then we also need a payload.
example:
- Host: bug.com
- X-Online-Host: bug.com
- X-Forward-Host: bug.com
- X-Forwarded-For: bug.com
- Connection: Keep-Alive or Close
- Proxy-Connection: Keep-Alive or Close
- Content-Type: * / *
- Content-Length: 0 or 1024 or another one
- And many more
Proxy and Port
The use of proxy and proxy port could use the original operator.
Proxies can also use public or Squid Proxy from VPS with port 80/8000/8080/3128 / etc mouthful can be invited to the free internet.,
found this thread usefull?
if you learn more about http injector
just hit and run the like botton below
Credit to owner of this tutorial = PHC family
*extra info about http injector*
credit to mr. Anarchy
*Lesson 101: how to make a ehi for tnt with screenshots*
https://phcorner.net/t/lesson-101-h...t-with-screenshots.161718/page-8#post-1660638
*Lesson 101: proper pingging no dc http injector / eproxy using pingtools pro*
https://phcorner.net/t/lesson-101-p...p-injector-eproxy-using-pingtools-pro.158079/
Attachments
-
You do not have permission to view the full content of this post. Log in or register now.
Last edited: