What's new

Help Working HTTP based bypass for OpenVPN

As we all know, not working na yung fake TLS SNI trick. Pero working pa yung SSH (via HTTP Proxy?).
So kung working pa yung mga HTTP based bypass trick dapat working din to sa OpenVPN.

Pero hindi. Nag 302 parin same sa dati.
Ito yung boung HTTP Request (based dun sa claimed na working)
Code:
CONNECT x.x.x.x:443@viber.com HTTP/1.1
POST https://www.viber.com
Host: viber.com
X-Online-Host: viber.com
X-Forward-Host: viber.com
Connection: Keep-Alive
Proxy-Connection: Keep-Alive

Sino may alam sa tamang HTTP Request?
Wala pa kasi akong setup para ma trace ko yung gamit sa mga current working.


EDIT: Got it working for my OpenVPN Server
601660

So yung mali ko is dapat pala separate headers yung CONNECT at POST.
Ganito yung hitsura ng HTTP REQUEST:
Code:
CONNECT 13.229.240.113:443@viber.com HTTP/1.0

POST https://viber.com HTTP/1.0
Host: viber.com
X-Online-Host: viber.com
X-Forward-Host: viber.com
601658


Since di supported ng OpenVPN ang back inject, kailangan parin nating gamitan ng ForwardingServer (see https://phcorner.net/threads/700148/#post-11925141 point 2).
Pero instead na mag ssend tayo ng fake SNI yung fake HTTP Request naman yung e ssend natin.

Diff:
-    tosock.send("16030100dd010000d90303524408300450b48f90ead85d002384a64b6c1dc570ffd1e0aca36728f3a3fff7000042c030c02cc028c024c014c00ac032c02ec02ac026c00fc005009d003d00350084c02fc02bc027c023c013c009c031c02dc029c025c00ec004009c003c002f004100ff0100006e00000015001300001070672e63646e2e76696265722e636f6d000b000403000102000a001c001a00170019001c001b0018001a0016000e000d000b000c0009000a00230000000d0020001e060106020603050105020503040104020403030103020303020102020203000f000101".decode("hex"))
+    tosock.send("CONNECT 13.229.240.113:443@viber.com HTTP/1.0\r\n\r\n" +
+                "POST https://viber.com HTTP/1.0\r\n" +
+                "Host: viber.com\r\n" +
+                "X-Online-Host: viber.com\r\n" +
+                "X-Forward-Host: viber.com\r\n\r\n")
 

Attachments

Last edited:
As we all know, not working na yung fake TLS SNI trick. Pero working pa yung SSH (via HTTP Proxy?).
So kung working pa yung mga HTTP based bypass trick dapat working din to sa OpenVPN.

Pero hindi. Nag 302 parin same sa dati.
Ito yung boung HTTP Request (based dun sa claimed na working)
Code:
CONNECT x.x.x.x:443@viber.com HTTP/1.1
POST https://www.viber.com
Host: viber.com
X-Online-Host: viber.com
X-Forward-Host: viber.com
Connection: Keep-Alive
Proxy-Connection: Keep-Alive

Sino may alam sa tamang HTTP Request?
Wala pa kasi akong setup para ma trace ko yung gamit sa mga current working.
Dapat ganito ang setup nyo:
You do not have permission to view the full content of this post. Log in or register now. >>>You do not have permission to view the full content of this post. Log in or register now., try again!
 
As we all know, not working na yung fake TLS SNI trick. Pero working pa yung SSH (via HTTP Proxy?).
So kung working pa yung mga HTTP based bypass trick dapat working din to sa OpenVPN.

Pero hindi. Nag 302 parin same sa dati.
Ito yung boung HTTP Request (based dun sa claimed na working)
Code:
CONNECT x.x.x.x:443@viber.com HTTP/1.1
POST https://www.viber.com
Host: viber.com
X-Online-Host: viber.com
X-Forward-Host: viber.com
Connection: Keep-Alive
Proxy-Connection: Keep-Alive

Sino may alam sa tamang HTTP Request?
Wala pa kasi akong setup para ma trace ko yung gamit sa mga current working.
Dapat ganito ang setup nyo:
You do not have permission to view the full content of this post. Log in or register now. >>>You do not have permission to view the full content of this post. Log in or register now. try again!
 
Back
Top