What's new

Closed Paano katayin si payload (302 status)

Status
Not open for further replies.

winfe

Honorary Poster
Joined
Jul 7, 2016
Posts
368
Reaction
121
Points
162
nakita ko po sa isang blog site



sa dami ng gustong matuto
testing to max
302 status



paki basa sa ilalim





HTTP Injector
Mobile proxy server with the ability to modify requests and access blocked websites behind firewall, etc.

Glossary Payload Keyword Inject Method Troubleshoot VPN
Glossary

Before we get started, let's understand the meaning
# Word Meaning
[Main] Payload HTTP header data payload that will be injected
Remote Proxy Remote HTTP proxy (ex: Squid proxy/APN proxy)
Debug Mode Show your data that you send/received in app log (Please turn off during normal usage)
Battery Saver Disable Wakelock that prevent your CPU from sleeping
Google DNS Use Google DNS to bypass blocked websites and prevent your ISP from knowing what websites you're visiting.
Start SSH Start SSH connection upon starting injection.
[SSH/Setting] Connect Mode There's two modes, iptables (root) which will require root and it only tunnel port 80 and 443 traffic.
VPN Service mode is for Android 4.0+ and will tunnel all traffic to your server. (Please use root mode, if you are having issue with VPN Service mode)
SSH Secure Shell is a encrypted network protocol for initiating text-based shell sessions on remote machines in a secure way.
SSH Host SSH IP/hostname
SSH Port The port for your SSH server, normally will be port 22 (Normally public squid/http proxy will block port 22)
Username SSH username
Password SSH password
Data Compression Compress data packet using zlib.
Upstream Proxy HTTP Injector currently is using port 8989 (fixed), you have to enable and set 127.0.0.1:8989 for the SSH to connect to HTTP Injector local proxy server.
Payload Keyword

Using the below keyword, the app will automatically replace with relavent data upon injection, you don't need to replace the word inside the square bracket unless you know what you are doing.
Supported keyword: [host] [port] [host_port] [protocol] [netData] [cr] [lf] [crlf] [lfcr]
Assume that 188.100.100.123 is your SSH Server IP and 22 is your SSH port
Keyword Auto Replaced Meaning
[host] 188.100.100.123 Destination host
[port] 22 Destination port
[host_port] 188.100.100.123:22 Destination host and port, seperated by colon :
[ssh] 188.100.100.123:22 SSH server ip and port that you set at settings
[protocol] HTTP\1.0 or HTTP\1.1 HTTP protocol version
[netData] CONNECT [host_port] [protocol] Short form of three keywords
[cr] \r Carriage Return, U+000D
[lf] \n Line Feed, U+000A
[crlf] \r\n CR (U+000D) followed by LF (U+000A)
[lfcr] \n\r LF (U+000A) followed by CR (U+000D)
[crlf][crlf] \r\n\r\n To indicate the end of HTTP header
Inject Method

Notice: In this example we are using "CONNECT" & "HEAD" request method and domain.com as the host you want to spoof, you might need to use GET/POST/DELETE/CONNECT/HEAD...
Make sure your remote HTTP proxy allow the request method else you will get 403 error.
Tips: Use "Payload Generator" inside HTTP Injector app instead of writing manually. Normally we just need to use "CONNECT" request method
Method Payload
Normal CONNECT [host_port] [protocol][crlf]Host: domain.com[crlf][crlf]
Front Inject GET You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1[crlf]Host: domain.com[crlf][crlf]CONNECT [host_port] [protocol][crlf][crlf]
Back Inject CONNECT [host_port] HTTP/1.1[crlf][crlf]GET You do not have permission to view the full content of this post. Log in or register now. [protocol][crlf]Host: domain.com[crlf][crlf]
Front Query CONNECT domain.com@[host_port][crlf]GET You do not have permission to view the full content of this post. Log in or register now. [protocol][crlf]Host: domain.com[crlf][crlf]
Back Query CONNECT [host_port]@domain.com[crlf]GET You do not have permission to view the full content of this post. Log in or register now. [protocol][crlf]Host: domain.com[crlf][crlf]
Troubleshoot

302 Error code - If you are getting 302 HTTP header code that means your ISP is redirecting your request to their captive portal page. Normally ISP blacklisted your remote proxy or the HTTP Payload
400 Error code - This indicate that your payload is invalid and can't be understand by remote proxy
Connection timeout - It could be that your network connection is slow or the remote proxy is slow
VPN

Psiphon - To use with psiphon (uncheck Start SSH), you can't use [host_port] in your payload, you need to get the SSH IP of psipon and hardcode it (not tested)
OpenVPN - Disable "Start SSH" and use HTTP Injector with your OpenVPN if you don't have SSH server.
You have to add http-proxy 127.0.0.1 8989 and bypass route route replace_to_your_remote_proxy_ip 255.255.255.255 net_gateway (change "replace_to_your_remote_proxy_ip" to IP) to your VPN config.
Evozi - email@evozi.com
 
salamat sa info ts
di ko pa naman dama
connection established though dc sometimes
hehehe
 
Sa mga 15 year old na katulad ko na nosebleed na ito sa inyu


http injector mobile proxy server na may kakayahan upang baguhin ang mga kahilingan at pag-access hinarangan website likod ng firewall, atbp glossary kargamento keyword inject paraan troubleshoot vpn glossary bago namin makapagsimula, hayaan maunawaan ang kahulugan # Salita kahulugan [Main] kargamento http header data kargamento na ay injected remote proxy remote http proxy (ex: pusit proxy / APN proxy) debug mode ipakita ang iyong mga data na kayo magpadala / natanggap sa log app (mangyaring i-off sa panahon ng normal na paggamit) baterya saver disable wakelock na pigilan ang iyong CPU mula sa pagtulog google dns gamitin ang google dns upang lampasan naharang website at maiwasan ang iyong ISP mula sa alam kung ano ang mga website na iyong binibisita. simulan ssh start ssh koneksyon sa simula iniksyon. [Ssh / setting] kumonekta mode mayroong dalawang mga mode, iptables (root) na kung saan ay nangangailangan ng root at ito lamang ang tunnel port 80 at 443 na trapiko. vpn service mode ay para sa android 4.0 + at kalooban tunnel lahat ng trapiko sa iyong server. (Mangyaring gamitin ugat mode, kung ikaw ay nakakaranas ng isyu sa vpn service mode) ssh secure shell ay isang naka-encrypt na network protocol para sa pagpapasimula text-based na mga sesyon shell sa remote machine sa isang ligtas na paraan. ssh host ssh ip / hostname ssh port sa port para sa iyong ssh server, normal ay port 22 (normal pampublikong pusit / http proxy ay block port 22) username ssh username password password ssh data compression compress data packet gamit zlib. upstream proxy http injector kasalukuyan ay gumagamit ng port 8989 (fixed), kailangan mong paganahin at i-set 127.0.0.1:8989 para sa ssh upang kumonekta sa http injector lokal proxy server. kargamento keyword gamit ang ibaba keyword, ang app ay awtomatikong palitan sa relavent data sa iniksyon, hindi mo na kailangan upang palitan ang salita sa loob ng square bracket maliban kung alam mo kung ano ang iyong ginagawa. suportado keyword: [host] [port] [host_port] [protocol] [netdata] [cr] [lf] [CRLF] [lfcr] ipalagay na 188.100.100.123 ay ang iyong ssh server ip at 22 ay ang iyong ssh port keyword auto pinalitan kahulugan destination host [host] 188.100.100.123 [Port] 22 destination port [Host_port] 188.100.100.123:22 destination host at port, na pinaghihiwalay ng colon: [Ssh] 188.100.100.123:22 ssh server ip at port na ikaw itinakda sa mga setting [Protocol] http \ 1.0 o http \ 1.1 http protocol bersiyon [Netdata] kumonekta [host_port] [protocol] maikling form ng tatlong mga keyword [Cr] \ r carriage return, u + 000d [Lf] \ n linya feed, u + 000a [CRLF] \ r \ n cr (u + 000d) na sinundan ng lf (u + 000a) [Lfcr] \ n \ r lf (u + 000a) na sinundan ng cr (u + 000d) [CRLF] [CRLF] \ r \ n \ r \ n upang ipahiwatig ang katapusan ng http header iniksyon paraan paunawa: sa halimbawa na ito kami ay gumagamit "kumonekta" & "head" paraan kahilingan at domain.com bilang ang host na nais mong madaya, maaaring kailangan mong gumamit ng makakuha / post / tanggalin / kumonekta / head ... siguraduhin na ang iyong remote http proxy payagan ang kahilingan paraan pa ang makakakuha ka ng 403 error. tip: gamitin ang "kargamento generator" sa loob http injector app sa halip ng pagsulat mano-mano. normal lang namin kailangan upang gamitin ang "Connect" na paraan kahilingan paraan kargamento normal kumonekta [host_port] [protocol] [CRLF] host: domain.com [CRLF] [CRLF] front-iniksyon get You do not have permission to view the full content of this post. Log in or register now. http / 1.1 [CRLF] host: domain.com [CRLF] [CRLF] kumonekta [host_port] [protocol] [CRLF] [CRLF] pabalik inject kumonekta [host_port] http / 1.1 [CRLF] [CRLF] makakuha You do not have permission to view the full content of this post. Log in or register now. [protocol] [CRLF] host: domain.com [CRLF] [CRLF] front query kumonekta domain.com @ [host_port] [CRLF] makakuha You do not have permission to view the full content of this post. Log in or register now. [protocol] [CRLF] host: domain.com [CRLF] [CRLF] bumalik query kumonekta [host_port] @ domain.com [CRLF] get You do not have permission to view the full content of this post. Log in or register now. [protocol] [CRLF] host: domain.com [CRLF] [CRLF] troubleshoot 302 error code - kung ikaw ay pagkuha ng 302 http header code na nangangahulugan na ang iyong ISP ay nagre-redirect ang iyong kahilingan sa kanilang bihag page portal. normal isp blacklisted iyong remote proxy o ang http kargamento 400 error code - ito ay nagpapahiwatig na ang iyong kargamento ay hindi wasto at hindi maaaring maunawaan sa pamamagitan ng remote proxy koneksyon timeout - maaaring ito ay na ang iyong koneksyon sa network ay mabagal o ang remote proxy ay mabagal vpn psiphon - gamitin na may psiphon (alisin ang tsek start ssh), hindi ka maaaring gamitin ang [host_port] sa iyong mga kargamento, kailangan mo upang makuha ang ssh ip ng psipon at hardcode ito (hindi nasubukan) openvpn - huwag paganahin ang "simulan ssh" at gamitin http injector sa iyong openvpn kung hindi ka magkaroon ng ssh server. kailangan mong magdagdag ng http-proxy 127.0.0.1 8989 at bypass ruta ruta replace_to_your_remote_proxy_ip 255.255.255.255 net_gateway (baguhin "replace_to_your_remote_proxy_ip" sa ip) sa iyong vpn config.
 
sa haba ng binasa ko hindi ko naintindihan, nag siksikan sa utak ko ang mga word, code at meaning, hahaha thanks sa share TS.
 
Ak9 ginagawa ko ..ina activate ko nalang yung http head replacer para yung 302 magiging 200 conection established na
 
oi ang dami dugo sa ilong ko pasensya na senior citizen na pa daan lang, salamat sa share may natutunan din ako hehe
 
Status
Not open for further replies.

Similar threads

Back
Top