“webinar”/ “webinar”/
Welcome to Our Community
Wanting to join the rest of our members? Feel free to sign up today.

Ask Me Anything Private proxy-cloaker FREE!

Discussion in 'Programming and Scripts' started by Graybeard, May 31, 2019.

  1. Graybeard

    Graybeard Well-Known Member affiliate

    4,158
    2,069
    113
    This how I made a reverse tunnel SSH SOCKS5 proxy for my browser today with no proxy server software to install;

    • User should be normal user (not root) for security
    • Open up the firewall port on the server (if closed) (8888 example) any port not in use 5000-13000 should work fine
    • Open a terminal (on LINUX, Mac?) or Putty on Windows\
    • Then ssh to your server (see ssh command below)
    • The following works on LINUX Ubuntu 18.04 localhost and Ubuntu 16.04 remote server (shell)
    Terminal#1:
    Code:
    $ ssh -ND 8888 [email protected]
    #if you  do -vvv it will debug and tell you all the data points (see hacking)
    $ ssh -ND 8888 [email protected] -vvv
    Then start chromium as follows: (should work with (some variable of) Chrome as the command in a separate terminal)
    Terminal #2:
    Code:
    chromium-browser --proxy-server="socks://localhost:8888"
    You will have a data-center IP so Google will see you as a proxy and you will get a national location (not local). Also, you will get recaptcha at times

    You may want to try this if you need to be seen as in another country for legitimate reasons ...

    Is This CLOAKING :D

    ssh tunnel and socks proxy error: empty reply from server
    SSH dynamic forwarding proxy - "No data received" in chrome
    If ssh connection fails using SOCKS then what? Automate switch to no proxy?
    SSH Tunnelling for HTTP: Does target HTTP Proxy Port have to be exposed?
    How does reverse SSH tunneling work?
     
    Last edited: May 31, 2019
    EL GNAOUI likes this.
  2. Voluum
  3. Graybeard

    Graybeard Well-Known Member affiliate

    4,158
    2,069
    113
    I wonder how the free google cloud servers might work for this ...
     
  4. Graybeard

    Graybeard Well-Known Member affiliate

    4,158
    2,069
    113
    so I wanted to try Outbrain with their astounding anti bot technology
    (Disclaimer: I am a person using a known data center IP as a proxy -- for all they know I could be a Cambodian :p with a US IP address)

    >>>log
    debug1: channel 51: free: direct-tcpip: listening port 6769 for wazimo-d.openx.net port 443, connect from ::1 port 40672 to ::1 port 6769, nchannels 22
    debug3: channel 51: status: The following connections are open:
    #2 direct-tcpip: listening port 6769 for search.spotxchange.com port 443, connect from ::1 port 40978 to ::1 port 6769 (t4 r1 i0/0 o0/0 fd 6/6 cc -1)
    #3 dynamic-tcpip (t13 nr0 i0/0 o0/0 fd 7/7 cc -1)
    #4 direct-tcpip: listening port 6769 for events.crazyclickstats.com port 443, connect from ::1 port 40992 to ::1 port 6769 (t4 r0 i0/0 o0/0 fd 8/8 cc -1)
    #5 direct-tcpip: listening port 6769 for news.google.com port 443, connect from ::1 port 40980 to ::1 port 6769 (t4 r2 i0/0 o0/0 fd 9/9 cc -1)
    #6 direct-tcpip: listening port 6769 for pixel.tapad.com port 443, connect from ::1 port 40952 to ::1 port 6769 (t4 r3 i0/0 o0/0 fd 10/10 cc -1)
    #7 direct-tcpip: listening port 6769 for www.facebook.com port 443, connect from ::1 port 40994 to ::1 port 6769 (t4 r4 i0/0 o0/0 fd 11/11 cc -1)
    #8 direct-tcpip: listening port 6769 for www.coolimba.com port 443, connect from ::1 port 40996 to ::1 port 6769 (t4 r5 i0/0 o0/0 fd 12/12 cc -1)<<<

    www.coolimba.com is the outbrain ad I was sent to ... Someone paid for my proxy clicks :eek: good luck to the winners :)

    is this called decloaking :D
     
    Last edited: Jun 1, 2019
  5. Graybeard

    Graybeard Well-Known Member affiliate

    4,158
    2,069
    113
    cruising through pornhub now youtube (cams white label)haha
    You can run but you cannot easily hide on the internet (from me anyway:p)
    >>>

    debug3: channel 36: status: The following connections are open:
    #2 direct-tcpip: listening port 6769 for ads.trafficjunky.net port 443, connect from ::1 port 45738 to ::1 port 6769 (t4 r8 i0/0 o3/0 fd 6/6 cc -1)
    #3 dynamic-tcpip (t13 nr0 i0/0 o0/0 fd 7/7 cc -1)
    #4 direct-tcpip: listening port 6769 for www.google-analytics.com port 443, connect from ::1 port 45704 to ::1 port 6769 (t4 r3 i0/0 o0/0 fd 8/8 cc -1)
    #5 direct-tcpip: listening port 6769 for search.spotxchange.com port 443, connect from ::1 port 45628 to ::1 port 6769 (t4 r12 i0/0 o0/0 fd 9/9 cc -1)
    #6 direct-tcpip: listening port 6769 for chaturbate.com port 443, connect from ::1 port 45630 to ::1 port 6769 (t4 r0 i0/0 o0/0 fd 10/10 cc -1)
    #7 direct-tcpip: listening port 6769 for public.chaturbate.com port 443, connect from ::1 port 45632 to ::1 port 6769 (t4 r2 i0/0 o0/0 fd 11/11 cc -1)
    #8 direct-tcpip: listening port 6769 for news.google.com port 443, connect from ::1 port 45660 to ::1 port 6769 (t4 r1 i0/0 o0/0 fd 12/12 cc

    #2 direct-tcpip: listening port 6769 for ads.trafficjunky.net port 443, connect from ::1 port 45738 to ::1 port 6769 (t4 r8 i3/0 o3/0 fd 6/6 cc -1)
    #3 dynamic-tcpip (t13 nr0 i0/0 o0/0 fd 7/7 cc -1)
    #4 direct-tcpip: listening port 6769 for www.google-analytics.com port 443, connect from ::1 port 45704 to ::1 port 6769 (t4 r3 i0/0 o0/0 fd 8/8 cc -1)
    #5 direct-tcpip: listening port 6769 for search.spotxchange.com port 443, connect from ::1 port 45628 to ::1 port 6769 (t4 r12 i0/0 o0/0 fd 9/9 cc -1)
    #6 direct-tcpip: listening port 6769 for chaturbate.com port 443, connect from ::1 port 45630 to ::1 port 6769 (t4 r0 i0/0 o0/0 fd 10/10 cc -1)
    #7 direct-tcpip: listening port 6769 for public.chaturbate.com port 443, connect from ::1 port 45632 to ::1 port 6769 (t4 r2 i0/0 o0/0 fd 11/11 cc -1)
    #8 direct-tcpip: listening port 6769 for news.google.com port 443, connect from ::1 port 45660 to ::1 port 6769 (t4 r1 i0/0 o0/0 fd 12/12 cc
    debug2: channel 3: pre_dynamic: have 0

    #3 dynamic-tcpip (t13 nr0 i0/0 o0/0 fd 7/7 cc -1)
    #4 direct-tcpip: listening port 6769 for www.google-analytics.com port 443, connect from ::1 port 45704 to ::1 port 6769 (t4 r3 i0/0 o0/0 fd 8/8 cc -1)
    #5 direct-tcpip: listening port 6769 for search.spotxchange.com port 443, connect from ::1 port 45628 to ::1 port 6769 (t4 r12 i0/0 o0/0 fd 9/9 cc -1)
    #6 direct-tcpip: listening port 6769 for chaturbate.com port 443, connect from ::1 port 45630 to ::1 port 6769 (t4 r0 i0/0 o0/0 fd 10/10 cc -1)
    #7 direct-tcpip: listening port 6769 for public.chaturbate.com port 443, connect from ::1 port 45632 to ::1 port 6769 (t4 r2 i0/0 o0/0 fd 11/11 cc -1)
    #8 direct-tcpip: listening port 6769 for news.google.com port 443, connect from ::1 port 45660 to ::1 port 6769 (t4 r1 i0/0 o0/0 fd 12/12 cc -1)
    #9 direct-tcpip: listening port 6769 for roomlister.stream.highwebmedia.com port 443, connect from ::1 port 45666 to ::1 port 6769 (t4 r4 i0/0

    #4 direct-tcpip: listening port 6769 for www.google-analytics.com port 443, connect from ::1 port 45704 to ::1 port 6769 (t4 r3 i0/0 o0/0 fd 8/8 cc -1)
    #5 direct-tcpip: listening port 6769 for search.spotxchange.com port 443, connect from ::1 port 45628 to ::1 port 6769 (t4 r12 i0/0 o0/0 fd 9/9 cc -1)
    #6 direct-tcpip: listening port 6769 for chaturbate.com port 443, connect from ::1 port 45630 to ::1 port 6769 (t4 r0 i0/0 o0/0 fd 10/10 cc -1)
    #7 direct-tcpip: listening port 6769 for public.chaturbate.com port 443, connect from ::1 port 45632 to ::1 port 6769 (t4 r2 i0/0 o0/0 fd 11/11 cc -1)
    #8 direct-tcpip: listening port 6769 for news.google.com port 443, connect from ::1 port 45660 to ::1 port 6769 (t4 r1 i0/0 o0/0 fd 12/12 cc -1)
    #9 direct-tcpip: listening port 6769 for roomlister.stream.highwebmedia.com port 443, connect from ::1 port 45666 to ::1 port 6769 (t4 r4 i0/0
    debug2: channel 18: is dead
    debug2: channel 18: garbage collecting
    debug1: channel 18: free: direct-tcpip: listening port 6769 for etahub.com port 443, connect from ::1 port 45744 to ::1 port 6769, nchannels 19
    debug3: channel 18: status: The following connections are open:
    #3 dynamic-tcpip (t13 nr0 i0/0 o0/0 fd 7/7 cc -1)
    #4 direct-tcpip: listening port 6769 for www.google-analytics.com port 443, connect from ::1 port 45704 to ::1 port 6769 (t4 r3 i0/0 o0/0 fd 8/8 cc -1)
    #5 direct-tcpip: listening port 6769 for search.spotxchange.com port 443, connect from ::1 port 45628 to ::1 port 6769 (t4 r12 i0/0 o0/0 fd 9/9 cc -1)
    #6 direct-tcpip: listening port 6769 for chaturbate.com port 443, connect from ::1 port 45630 to ::1 port 6769 (t4 r0 i0/0 o0/0 fd 10/10 cc -1)
    #7 direct-tcpip: listening port 6769 for public.chaturbate.com port 443, connect from ::1 port 45632 to ::1 port 6769 (t4 r2 i0/0 o0/0 fd 11/11 cc -1)
    #8 direct-tcpip: listening port 6769 for news.google.com port 443, connect from ::1 port 45660 to ::1 port 6769 (t4 r1 i0/0 o0/0 fd 12/12 cc -1)
    #9 direct-tcpip: listening port 6769 for roomlister.stream.highwebmedia.com port 443, connect from ::1 port 45666 to ::1 port 6769 (t4 r4 i0/0

    #4 direct-tcpip: listening port 6769 for www.google-analytics.com port 443, connect from ::1 port 45704 to ::1 port 6769 (t4 r3 i3/0 o3/0 fd 8/8 cc -1)
    #5 direct-tcpip: listening port 6769 for search.spotxchange.com port 443, connect from ::1 port 45628 to ::1 port 6769 (t4 r12 i0/0 o0/0 fd 9/9 cc -1)
    #6 direct-tcpip: listening port 6769 for chaturbate.com port 443, connect from ::1 port 45630 to ::1 port 6769 (t4 r0 i0/0 o0/0 fd 10/10 cc -1)
    #7 direct-tcpip: listening port 6769 for public.chaturbate.com port 443, connect from ::1 port 45632 to ::1 port 6769 (t4 r2 i0/0 o0/0 fd 11/11 cc -1)
    #8 direct-tcpip: listening port 6769 for news.google.com port 443, connect from ::1 port 45660 to ::1 port 6769 (t4 r1 i0/0 o0/0 fd 12/12 cc -1)
    #9 direct-tcpip: listening port 6769 for roomlister.stream.highwebmedia.com port 443, connect from ::1 port 45666 to ::1 port 6769 (t4 r4 i0/0 o
    debug2: channel 3: pre_dynamic: have 0


    <<<

    no problems clicking ads and viewing as a proxy :p

    Sorry if anyone paid for my click and is pissed because it didn't convert -- at least you know why :D
     
  6. Graybeard

    Graybeard Well-Known Member affiliate

    4,158
    2,069
    113
    slicing through Taboola ads this morning -- rape and pillage -- no problem with this proxy :eek:

    >>>
    debug2: channel 25: garbage collecting
    debug1: channel 25: free: direct-tcpip: listening port 6769 for mailonline-us-d.openx.net port 443, connect from ::1 port 52468 to ::1 port 6769, nchannels 21
    debug3: channel 25: status: The following connections are open:
    #2 direct-tcpip: listening port 6769 for fonts.gstatic.com port 443, connect from ::1 port 52678 to ::1 port 6769 (t4 r0 i0/0 o0/0 fd 6/6 cc -1)
    #3 dynamic-tcpip (t13 nr0 i0/0 o0/0 fd 7/7 cc -1)
    #4 direct-tcpip: listening port 6769 for www.google-analytics.com port 443, connect from ::1 port 52682 to ::1 port 6769 (t4 r1 i0/0 o0/0 fd 8/8 cc -1)
    #5 direct-tcpip: listening port 6769 for wf.taboola.com port 443, connect from ::1 port 52684 to ::1 port 6769 (t4 r2 i0/0 o0/0 fd 9/9 cc -1)
    #6 direct-tcpip: listening port 6769 for trc.taboola.com port 443, connect from ::1 port 52686 to ::1 port 6769 (t4 r3 i0/0 o0/0 fd 10/10 cc -1)
    #7 direct-tcpip: listening port 6769 for px.moatads.com port 443, connect from ::1 port 52688 to ::1 port 6769 (t4 r4 i0/0 o0/0 fd 11/11 cc -1)
    #8 direct-tcpip: listening port 6769 for convlatbmp.taboola.com port 443, connect from ::1 port 52694 to ::1 port 6769 (t4 r5 i0/0 o0/0 fd 12/12 cc -1)
    #9

    <<<

    this is 10 -40 % of what you are paying for
    WTF
     
  7. Graybeard

    Graybeard Well-Known Member affiliate

    4,158
    2,069
    113
    In case your are wondering here's a screenshot from a proxy/VPN leak detector
    [​IMG]

    BULLETPROOF
     
  8. Graybeard

    Graybeard Well-Known Member affiliate

    4,158
    2,069
    113
    Bing.com Locates me as Freemont, CA and in the general SF Bay area ... so I can spy the Bing Ads. Bingo ;)
     
    azgold likes this.
MI