Mr_Socrattes
Forum Veteran
- Joined
- Jul 13, 2017
- Posts
- 3,166
- Solutions
- 1
- Reaction
- 1,813
- Points
- 868
Note lang po for advance users lang po
Una dapat may valid SSH SSL/TLS account ka kung wala pa kumuha ka dto
You do not have permission to view the full content of this post. Log in or register now.
You do not have permission to view the full content of this post. Log in or register now.
You do not have permission to view the full content of this post. Log in or register now.
OK pag nakakuha ng account go to setting then go to SSH Tunnel fill up the host/IP username and password then punta tayo spoof server at ang gagamitin natin ay ang M.Google.com/216.58.207.203:80,443
Example : Normaly "[method] [host_port] HTTP/1.0\r\n\r\n".
with Front Query : "[method] bughost.com@[host_port] HTTP/1.0\r\n\r\n".
Spoof Server:M.Google.com:443/HTTP/1.0\r\n\r\n
Or
Spoof Server:216.58.207.203:443/HTTP/1.0\r\n\r\n
Example :
with Back Query : "[method] [host_port]@bughost.com HTTP/1.0\r\n\r\n".
Spoof Server:443:M.Google.com/HTTP/1.0\r\n\r\n
Or
Spoof Server:443:216.58.207.203/HTTP/1.0\r\n\r\n
[protocol] : HTTP Request Version Protocol (HTTP/0.9 or HTTP/1.0 or HTTP/1.1) in Request data from Client.
Example :
"[method] [host_port] [protocol]\r\n\r\n".
Spoof Server:M.Google.com:443/HTTP/0.9\r\n\r\n
Spoof Server:M.Google.com:443/HTTP/1.0\r\n\r\n
Spoof Server:M.Google.com:443/HTTP/1.1\r\n\r\n
Or
Spoof Server:216.58.207.203:443/HTTP/0.9\r\n\r\n
Spoof Server:216.58.207.203:443/HTTP/1.0\r\n\r\n
Spoof Server:216.58.207.203:443/HTTP/1.1)\r\n\r\n
Remote server naman po
[auth] : Basic of Authentication for Remote Server (if needed), to working this command, fill Username and Password in Remote Server. (your_proxy_or_host:your_port@your_username:your_password). ex : [raw][crlf]Proxy-Authorization: [auth][crlf*2] .
Example:
Remote server:128.199.66.186:443@usernameassword
Or
Remote server:128.199.66.186:443
Kung e sesetup ang SSL/TLS Proxy & SSL/TLS-HTTP Proxy use SSL supported remote proxy sa port 443 and SSH port 443 din wag e set sa SSH port ang 22.
Sample remote proxy:
128.199.66.186 :443,80,8080,3128 T SSL support:true SSH Port:22,80,443 7k 180ms 95% reliable
Sample Payload Commands
1. [real_raw] or [realData] :
with Front Inject :
HEAD You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1\r\nHost: m.google.com\r\n\r\n[real_raw]
with Back Inject :
[real_raw]HEAD You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1\r\nHost: m.google.com\r\n\r\n
2. [raw] or [netData] :
with Front Inject :
HEAD You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1\r\nHost: m.google.com\r\n\r\n[raw]\r\n\r\n
with Back Inject :
[raw]\r\n\r\nHEAD You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1\r\nHost: m.google.com\r\n\r\n
3. [split] :
[raw]\r\n\r\n[split]POST You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1\r\nHost: m.google.com\r\n\r\n
4. [split_delay] or [split_delay=n] :
[raw]\r\n\r\n[split_delay]POST You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1\r\nHost: m.google.com\r\n\r\n
[split_delay] or [split_delay=n] :
[raw]\r\n\r\n[split_delay=5]POST You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1\r\nHost: m.google.com\r\n\r\n
5. [random==1;2;3;etc]:
CONNECT [random=m.google.com;example2.com;example3.com] HTTP/1.0\r\nHost: [random=m.Google.com;example2.com;example3.com]\r\n\r\n
Manual Payloads
Proxy type:SSL/TLS Proxy>HTTP Proxy
Sa Base Payload ng SSL/TLS Proxy>HTTP Proxy kailangan ilagay ang request method na Connect
wag gumamit ng Get,Post,Head,Put,etc....
Example
Base payload:
CONNECT [host_port] HTTP/1.1\r\nHost: m.google.com\r\n\r\n
Sa SSL Payloads use Connect pwedeng gumamit ng Get,Post,Head,Put,etc...
Example
SSL Payload:
CONNECT [host_port] HTTP/1.1\r\nHost: m.google.com\r\nConnection: Keep-Alive\r\n\r\n
Proxy type Payloads with extra headers Example
Proxy type:SSL\TLS Proxy>HTTP Proxy
Example
Base Payloads:
CONNECT [host_port] HTTP/1.1\r\nHost: m.google.com\r\nX-Online-Host: m.google.com\r\nConnection: Keep-Alive\r\n[raw] [host_port] HTTP/1.1\r\n\r\n
SSL Payload:
CONNECT [host_port] HTTP/1.1\r\nHost: m.google.com\r\nConnection: Keep-Alive\r\n[raw] [host_port] HTTP/1.1\r\n\r\n
Single payload examples
1.Normal Inject,Connect,Online Host,Dual Connect
CONNECT [host_port] HTTP/1.1\r\nHost: m.google.com\r\nX-Online-Host: m.google.com\r\nConnection: Keep-Alive\r\n[raw]\r\nCONNECT [host_port] HTTP/1.1\r\n\r\n
2.normal Inject,Connect,Online Host,User Agent,Raw
CONNECT [host_port] HTTP/1.1\r\nHost: m.google.com\r\nX-Online-Host: m.google.com[crlf]Connection: Keep-Alive\r\n[raw]\r\nUser-Agent: [ua][crlf*2][raw] [host_port] HTTP/1.1\r\n\r\n
Multi payload example
1.Normal inject,Connect,Random,Online Host,Keep Alive,Dual Connect
CONNECT [host_port] HTTP/1.1\r\nHost: [random=m.google.com;Bughost.com;Example.com]\r\nX-Online-Host: [random=m.google.com;Bughost.com;Example.com]\r\nConnection: Keep-Alive\r\n[raw] [host_port] HTTP/1.1\r\n\r\n
2.Normal inject,Connect,Rotate,Online Host,Keep Alive,Dual Connect
CONNECT [host_port] HTTP/1.1\r\nHost: [rotate=m.google.com;Bughost.com;Example.com]\r\nX-Online-Host: [rotate=m.google.com;Bughost.com;Example.com]\r\nConnection: Keep-Alive\r\n[raw] [host_port] HTTP/1.1\r\n\r\n
3.Normal inject,Connect,Random,Online Host,Keep Alive,Dual Connect,Repeat
CONNECT [host_port] HTTP/1.1\r\nHost: [rotate=m.google.com;Bughost.com;Example.com]\r\nX-Online-Host: [rotate=m.google.com;Bughost.com;Example.com]\r\nConnection: Keep-Alive\r\n[raw] [host_port] HTTP/1.1\r\n\r\n[raw]\r\n\r\n[repeat][raw]\r\nConnection: keep-alive\r\n\r\n[repeat][raw]\r\nProxy-Connection: keep-alive\r\n\r\n
4.Normal inject,Connect,Random,Online Host,Keep Alive,User Agent,Raw,Repeat
CONNECT [host_port] HTTP/1.1\r\nHost: [rotate=m.google.com;Bughost.com;Example.com]\r\nX-Online-Host: [rotate=m.google.com;Bughost.com;Example.com]\r\nConnection: Keep-Alive\r\n[raw]\r\nUser-Agent: [ua][crlf*2][raw] [host_port] HTTP/1.1\r\n\r\n
5.Direct,Connect,Rotate,Online Host,Keep Alive,Dual Connect,Repeat
CONNECT [host_port] HTTP/1.1\r\nHost: [rotate=m.google.com;bughost.com]\r\nX-Online-Host: [rotate=m.google.com;bughost.com]\r\nConnection: Keep-Alive[crlf]CONNECT [host_port] HTTP/1.1\r\n\r\n[raw]\r\n\r\n[repeat][raw]\r\nConnection: keep-alive\r\n\r\n[repeat][raw]\r\nProxy-Connection: keep-alive\r\n\r\n
HTTP Proxy payload examples
Proxy Type:HTTP Proxy
Single payload example
1.Connect,Online Host,host,Auth,
CONNECT [host_port] HTTP/1.1\r\nHost: m.google.com\r\nX-Online-Host: m.google.com\r\nProxy-Connection: keep-alive\r\nConnection: keep-alive\r\n\r\n[delay_split][raw] [host_port] HTTP/1.1\r\nProxy-Authorization:you_hostort@usernameassword [auth]\r\nProxy-Connection: keep-alive\r\nConnection: keep-alive\r\n\r\n
2.Front inject,Get,Raw,Auth,Keep Alive
[raw]\r\n\r\nGET [host_port] HTTP/1.1\r\nProxy-Authorization: your_proxy_or_hostort@usernameassword [auth]\r\nProxy-Connection: keep-alive\r\nConnection: keep-alive\r\n\r\n
3.
[raw]\r\n\r\n [host_port] HTTP/1.1\r\nHost: m.google.com[host_port][crlf*2]
Multi payloads
1.Front inject,Get,Rotate,split_delay=#,Raw,Rotate,Keep Alive,Raw
[raw]\r\n\r\n GET You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1\r\nHost: [rotate=m.google.com;Bughost.com]\r\nX-Online-Host: [rotate=m.google.com;Bughost.com]\r\nConnection: Keep-Alive\r\n\r\n[split_delay=2][raw]\r\n\r\n
Other Methods examples
1.Head
[real_raw]\r\n\r\nHEAD You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1\r\nHost: m.google.com\r\nX-Online-Host: m.google.com\r\nConnection: Keep-Alive\r\nCONNECT [host_port] HTTP/1.1\r\n\r\n
2.Post
[raw]\r\n\r\n[split]POST You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1\r\nHost: m.google.com\r\n X-Online-Host: m.google.com\r\nConnection: Keep-Alive\r\nCONNECT [host_port] HTTP/1.1\r\n\r\n
3.Options
[raw]\r\n\r\n[split]OPTIONS You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1\r\nHost: m.google.com\r\n X-Online-Host: m.google.com\r\nConnection: Keep-Alive\r\nCONNECT [host_port] HTTP/1.1\r\n\r\n
4.Put
[raw]\r\n\r\n[split]POST You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1\r\nHost: m.google.com\r\n X-Online-Host: m.google.com\r\nConnection: Keep-Alive\r\nCONNECT [host_port] HTTP/1.1\r\n\r\n
Kung gagamitin ang payload generator ng app kailangan eedit ang na generate na payload para gagana sa Base Payload.
Settings
Local port:2323 or 8888 or 8989
Yung wala sa list wag ng galawin naka check dapat susunod
SSH Tunnel √
Auto clear √
Secure random √
Force stablished √
Go to SSH Tunnel
Data compression √
Url Pinger:
global-turbo-1.beta.opera-mini.net
or
107.167.115.241
Custom DNS:
8.8.8.8
8.8.4.4
or
209.244.0.3
209.244.0.4
Excluded IP:
0.0.0.0/8;10.0.0.0/8;100.64.0.0/10;127.0.0.0/8;169.254.0.0/16;172.16.0.0/12;192.0.0.0/29;192.0.2.0/24;192.88.99.0/24;192.168.0.0/16;198.18.0.0/15;198.51.100.0/24;203.0.113.0/24;224.0.0.0/3;118.184.180.0/24;118.184.180.46/24;47.88.48.131/32;192.168.8.1/24
Proxy type
Setting ng SSL account
Proxy type:SSL/TLS Proxy>HTTP Proxy or Direct SSL/TLS or SSL/TLS Proxy
kung hinde SSL ang account set only to HTTP Proxy
Proxy type:HTTP Proxy
Note:Sa setting ng Proxy type kung hinde SSL ang account mo hinde eto gagana sa SSL/TLS Proxy>HTTP Proxy, Direct SSL/TLS at SSL/TLS Proxy ang setting lang ay sa HTTP Proxy kung e sesetup ang SSL/TLS use SSL supported account only.
Sample config 1
Closed
Sample config 2
Closed
Hays my first tread ayoko ng gumawa ng ganitong treads ang hirap sorry dahil d completo and guide at least nag try ako at baka eto na ang last tread ko mas gusto kung maging leecher.
Una dapat may valid SSH SSL/TLS account ka kung wala pa kumuha ka dto
You do not have permission to view the full content of this post. Log in or register now.
You do not have permission to view the full content of this post. Log in or register now.
You do not have permission to view the full content of this post. Log in or register now.
OK pag nakakuha ng account go to setting then go to SSH Tunnel fill up the host/IP username and password then punta tayo spoof server at ang gagamitin natin ay ang M.Google.com/216.58.207.203:80,443
Example : Normaly "[method] [host_port] HTTP/1.0\r\n\r\n".
with Front Query : "[method] bughost.com@[host_port] HTTP/1.0\r\n\r\n".
Spoof Server:M.Google.com:443/HTTP/1.0\r\n\r\n
Or
Spoof Server:216.58.207.203:443/HTTP/1.0\r\n\r\n
Example :
with Back Query : "[method] [host_port]@bughost.com HTTP/1.0\r\n\r\n".
Spoof Server:443:M.Google.com/HTTP/1.0\r\n\r\n
Or
Spoof Server:443:216.58.207.203/HTTP/1.0\r\n\r\n
[protocol] : HTTP Request Version Protocol (HTTP/0.9 or HTTP/1.0 or HTTP/1.1) in Request data from Client.
Example :
"[method] [host_port] [protocol]\r\n\r\n".
Spoof Server:M.Google.com:443/HTTP/0.9\r\n\r\n
Spoof Server:M.Google.com:443/HTTP/1.0\r\n\r\n
Spoof Server:M.Google.com:443/HTTP/1.1\r\n\r\n
Or
Spoof Server:216.58.207.203:443/HTTP/0.9\r\n\r\n
Spoof Server:216.58.207.203:443/HTTP/1.0\r\n\r\n
Spoof Server:216.58.207.203:443/HTTP/1.1)\r\n\r\n
Remote server naman po
[auth] : Basic of Authentication for Remote Server (if needed), to working this command, fill Username and Password in Remote Server. (your_proxy_or_host:your_port@your_username:your_password). ex : [raw][crlf]Proxy-Authorization: [auth][crlf*2] .
Example:
Remote server:128.199.66.186:443@usernameassword
Or
Remote server:128.199.66.186:443
Kung e sesetup ang SSL/TLS Proxy & SSL/TLS-HTTP Proxy use SSL supported remote proxy sa port 443 and SSH port 443 din wag e set sa SSH port ang 22.
Sample remote proxy:
128.199.66.186 :443,80,8080,3128 T SSL support:true SSH Port:22,80,443 7k 180ms 95% reliable
Sample Payload Commands
1. [real_raw] or [realData] :
with Front Inject :
HEAD You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1\r\nHost: m.google.com\r\n\r\n[real_raw]
with Back Inject :
[real_raw]HEAD You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1\r\nHost: m.google.com\r\n\r\n
2. [raw] or [netData] :
with Front Inject :
HEAD You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1\r\nHost: m.google.com\r\n\r\n[raw]\r\n\r\n
with Back Inject :
[raw]\r\n\r\nHEAD You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1\r\nHost: m.google.com\r\n\r\n
3. [split] :
[raw]\r\n\r\n[split]POST You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1\r\nHost: m.google.com\r\n\r\n
4. [split_delay] or [split_delay=n] :
[raw]\r\n\r\n[split_delay]POST You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1\r\nHost: m.google.com\r\n\r\n
[split_delay] or [split_delay=n] :
[raw]\r\n\r\n[split_delay=5]POST You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1\r\nHost: m.google.com\r\n\r\n
5. [random==1;2;3;etc]:
CONNECT [random=m.google.com;example2.com;example3.com] HTTP/1.0\r\nHost: [random=m.Google.com;example2.com;example3.com]\r\n\r\n
Manual Payloads
Proxy type:SSL/TLS Proxy>HTTP Proxy
Sa Base Payload ng SSL/TLS Proxy>HTTP Proxy kailangan ilagay ang request method na Connect
wag gumamit ng Get,Post,Head,Put,etc....
Example
Base payload:
CONNECT [host_port] HTTP/1.1\r\nHost: m.google.com\r\n\r\n
Sa SSL Payloads use Connect pwedeng gumamit ng Get,Post,Head,Put,etc...
Example
SSL Payload:
CONNECT [host_port] HTTP/1.1\r\nHost: m.google.com\r\nConnection: Keep-Alive\r\n\r\n
Proxy type Payloads with extra headers Example
Proxy type:SSL\TLS Proxy>HTTP Proxy
Example
Base Payloads:
CONNECT [host_port] HTTP/1.1\r\nHost: m.google.com\r\nX-Online-Host: m.google.com\r\nConnection: Keep-Alive\r\n[raw] [host_port] HTTP/1.1\r\n\r\n
SSL Payload:
CONNECT [host_port] HTTP/1.1\r\nHost: m.google.com\r\nConnection: Keep-Alive\r\n[raw] [host_port] HTTP/1.1\r\n\r\n
Single payload examples
1.Normal Inject,Connect,Online Host,Dual Connect
CONNECT [host_port] HTTP/1.1\r\nHost: m.google.com\r\nX-Online-Host: m.google.com\r\nConnection: Keep-Alive\r\n[raw]\r\nCONNECT [host_port] HTTP/1.1\r\n\r\n
2.normal Inject,Connect,Online Host,User Agent,Raw
CONNECT [host_port] HTTP/1.1\r\nHost: m.google.com\r\nX-Online-Host: m.google.com[crlf]Connection: Keep-Alive\r\n[raw]\r\nUser-Agent: [ua][crlf*2][raw] [host_port] HTTP/1.1\r\n\r\n
Multi payload example
1.Normal inject,Connect,Random,Online Host,Keep Alive,Dual Connect
CONNECT [host_port] HTTP/1.1\r\nHost: [random=m.google.com;Bughost.com;Example.com]\r\nX-Online-Host: [random=m.google.com;Bughost.com;Example.com]\r\nConnection: Keep-Alive\r\n[raw] [host_port] HTTP/1.1\r\n\r\n
2.Normal inject,Connect,Rotate,Online Host,Keep Alive,Dual Connect
CONNECT [host_port] HTTP/1.1\r\nHost: [rotate=m.google.com;Bughost.com;Example.com]\r\nX-Online-Host: [rotate=m.google.com;Bughost.com;Example.com]\r\nConnection: Keep-Alive\r\n[raw] [host_port] HTTP/1.1\r\n\r\n
3.Normal inject,Connect,Random,Online Host,Keep Alive,Dual Connect,Repeat
CONNECT [host_port] HTTP/1.1\r\nHost: [rotate=m.google.com;Bughost.com;Example.com]\r\nX-Online-Host: [rotate=m.google.com;Bughost.com;Example.com]\r\nConnection: Keep-Alive\r\n[raw] [host_port] HTTP/1.1\r\n\r\n[raw]\r\n\r\n[repeat][raw]\r\nConnection: keep-alive\r\n\r\n[repeat][raw]\r\nProxy-Connection: keep-alive\r\n\r\n
4.Normal inject,Connect,Random,Online Host,Keep Alive,User Agent,Raw,Repeat
CONNECT [host_port] HTTP/1.1\r\nHost: [rotate=m.google.com;Bughost.com;Example.com]\r\nX-Online-Host: [rotate=m.google.com;Bughost.com;Example.com]\r\nConnection: Keep-Alive\r\n[raw]\r\nUser-Agent: [ua][crlf*2][raw] [host_port] HTTP/1.1\r\n\r\n
5.Direct,Connect,Rotate,Online Host,Keep Alive,Dual Connect,Repeat
CONNECT [host_port] HTTP/1.1\r\nHost: [rotate=m.google.com;bughost.com]\r\nX-Online-Host: [rotate=m.google.com;bughost.com]\r\nConnection: Keep-Alive[crlf]CONNECT [host_port] HTTP/1.1\r\n\r\n[raw]\r\n\r\n[repeat][raw]\r\nConnection: keep-alive\r\n\r\n[repeat][raw]\r\nProxy-Connection: keep-alive\r\n\r\n
HTTP Proxy payload examples
Proxy Type:HTTP Proxy
Single payload example
1.Connect,Online Host,host,Auth,
CONNECT [host_port] HTTP/1.1\r\nHost: m.google.com\r\nX-Online-Host: m.google.com\r\nProxy-Connection: keep-alive\r\nConnection: keep-alive\r\n\r\n[delay_split][raw] [host_port] HTTP/1.1\r\nProxy-Authorization:you_hostort@usernameassword [auth]\r\nProxy-Connection: keep-alive\r\nConnection: keep-alive\r\n\r\n
2.Front inject,Get,Raw,Auth,Keep Alive
[raw]\r\n\r\nGET [host_port] HTTP/1.1\r\nProxy-Authorization: your_proxy_or_hostort@usernameassword [auth]\r\nProxy-Connection: keep-alive\r\nConnection: keep-alive\r\n\r\n
3.
[raw]\r\n\r\n [host_port] HTTP/1.1\r\nHost: m.google.com[host_port][crlf*2]
Multi payloads
1.Front inject,Get,Rotate,split_delay=#,Raw,Rotate,Keep Alive,Raw
[raw]\r\n\r\n GET You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1\r\nHost: [rotate=m.google.com;Bughost.com]\r\nX-Online-Host: [rotate=m.google.com;Bughost.com]\r\nConnection: Keep-Alive\r\n\r\n[split_delay=2][raw]\r\n\r\n
Other Methods examples
1.Head
[real_raw]\r\n\r\nHEAD You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1\r\nHost: m.google.com\r\nX-Online-Host: m.google.com\r\nConnection: Keep-Alive\r\nCONNECT [host_port] HTTP/1.1\r\n\r\n
2.Post
[raw]\r\n\r\n[split]POST You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1\r\nHost: m.google.com\r\n X-Online-Host: m.google.com\r\nConnection: Keep-Alive\r\nCONNECT [host_port] HTTP/1.1\r\n\r\n
3.Options
[raw]\r\n\r\n[split]OPTIONS You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1\r\nHost: m.google.com\r\n X-Online-Host: m.google.com\r\nConnection: Keep-Alive\r\nCONNECT [host_port] HTTP/1.1\r\n\r\n
4.Put
[raw]\r\n\r\n[split]POST You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1\r\nHost: m.google.com\r\n X-Online-Host: m.google.com\r\nConnection: Keep-Alive\r\nCONNECT [host_port] HTTP/1.1\r\n\r\n
Kung gagamitin ang payload generator ng app kailangan eedit ang na generate na payload para gagana sa Base Payload.
Settings
Local port:2323 or 8888 or 8989
Yung wala sa list wag ng galawin naka check dapat susunod
SSH Tunnel √
Auto clear √
Secure random √
Force stablished √
Go to SSH Tunnel
Data compression √
Url Pinger:
global-turbo-1.beta.opera-mini.net
or
107.167.115.241
Custom DNS:
8.8.8.8
8.8.4.4
or
209.244.0.3
209.244.0.4
Excluded IP:
0.0.0.0/8;10.0.0.0/8;100.64.0.0/10;127.0.0.0/8;169.254.0.0/16;172.16.0.0/12;192.0.0.0/29;192.0.2.0/24;192.88.99.0/24;192.168.0.0/16;198.18.0.0/15;198.51.100.0/24;203.0.113.0/24;224.0.0.0/3;118.184.180.0/24;118.184.180.46/24;47.88.48.131/32;192.168.8.1/24
Proxy type
Setting ng SSL account
Proxy type:SSL/TLS Proxy>HTTP Proxy or Direct SSL/TLS or SSL/TLS Proxy
kung hinde SSL ang account set only to HTTP Proxy
Proxy type:HTTP Proxy
Note:Sa setting ng Proxy type kung hinde SSL ang account mo hinde eto gagana sa SSL/TLS Proxy>HTTP Proxy, Direct SSL/TLS at SSL/TLS Proxy ang setting lang ay sa HTTP Proxy kung e sesetup ang SSL/TLS use SSL supported account only.
Sample config 1
Closed
Sample config 2
Closed
Hays my first tread ayoko ng gumawa ng ganitong treads ang hirap sorry dahil d completo and guide at least nag try ako at baka eto na ang last tread ko mas gusto kung maging leecher.
Attachments
-
You do not have permission to view the full content of this post. Log in or register now.
Last edited: