AWVR

πŸ§ͺ PANDUAN PAYLOAD HTTP INJECTOR

  1. PENGANTAR 30-DETIK
    HTTP Injector membutuhkan 3 hal:

Yang akan kita bahas di bawah adalah bagian PAYLOAD saja.


  1. SKEMA PROTOKOL

Warna Skema Artinya Port Kapan dipakai 🟒 h2c:// HTTP/2 cleartext 80 Kalau server bug mendukung Upgrade h2c. 🟑 ws:// WebSocket biasa 80 Umum, paling stabil di operator 3G. πŸ”΄ wss:// WebSocket over TLS 443 Bypass DPI/penyaring berat (Telkomsel, XL).

Contoh bug lengkap:


  1. METHOD YANG SERING DIPAKAI

A. Basic (standar HTTP)

GET
HEAD
PUT
CONNECT
POST

B. Custom (anti-dpi)

_
-
G-G
-_-
-----

Cara pakai: tinggal ganti METHOD di payload.


  1. HEADER PALING SERING DIPAKAI

🟒 WebSocket (port 80)

Host: 128.199.x.x:22[crlf]
Connection: Upgrade[crlf]
User-Agent: [ua][crlf]
Sec-WebSocket-Key: dXP3jD9Ipw0B2EmWrMDTEw==[crlf]
Sec-WebSocket-Version: 13[crlf]
Upgrade: websocket[crlf][crlf]

🟑 HTTP2 (port 80)

Host: 128.199.x.x:22[crlf]
Connection: Upgrade, HTTP2-Settings[crlf]
HTTP2-Settings: [crlf]
Upgrade: h2c[crlf]
Alt-Svc: h2c=":80"[crlf][crlf]

πŸ”΄ Header biasa (keep-alive)

Host: www.i-sekai.my.id[crlf]
Connection: Keep-Alive[crlf]
Expect: 100-continue[crlf][crlf]

  1. MAIN PAYLOAD (TINGGAL SALIN)
    Catatan: Ganti 128.199.x.x:22 dengan IP & port SSH-mu.

Ganti www.i-sekai.my.id kalau bug-mu berbeda.

5.1 CloudFront / CloudFlare CDN (WebSocket 80)

GET / HTTP/1.1[crlf]
Host: 128.199.x.x:22[crlf]
Connection: Upgrade[crlf]
User-Agent: [ua][crlf]
Sec-WebSocket-Key: dXP3jD9Ipw0B2EmWrMDTEw==[crlf]
Sec-WebSocket-Version: 13[crlf]
Upgrade: websocket[crlf][crlf]

5.2 CloudFlare Proxy SSL (wss 443)

GET wss://128.199.x.x:22/ HTTP/1.1[crlf]
Host: 128.199.x.x:22[crlf]
Connection: Upgrade[crlf]
User-Agent: [ua][crlf]
Sec-WebSocket-Key: dXP3jD9Ipw0B2EmWrMDTEw==[crlf]
Sec-WebSocket-Version: 13[crlf]
Upgrade: websocket[crlf][crlf]

5.3 Local WebSocket (bebas port)

GET / HTTP/1.1[crlf]
Host: www.i-sekai.my.id[crlf]
Connection: Upgrade[crlf]
User-Agent: [ua][crlf]
Sec-WebSocket-Key: dXP3jD9Ipw0B2EmWrMDTEw==[crlf]
Sec-WebSocket-Version: 13[crlf]
Upgrade: websocket[crlf][crlf]

  1. CONTOH LENGKAP SIAP PAKAI
    Bug: www.i-sekai.my.id

SSH: 128.199.230.100:22

Kebutuhan: bypass Telkomsel 0p0k, pakai wss.

Hasil payload (tinggal paste di HI):

GET wss://128.199.230.100:22/ HTTP/1.1[crlf]
Host: 128.199.230.100:22[crlf]
Connection: Upgrade[crlf]
User-Agent: [ua][crlf]
Sec-WebSocket-Key: dXP3jD9Ipw0B2EmWrMDTEw==[crlf]
Sec-WebSocket-Version: 13[crlf]
Upgrade: websocket[crlf][crlf]

Note: Jika ingin pakai method β€œG-G” atau β€œ--” cukup ganti baris pertama:

G-G wss://128.199.230.100:22/ HTTP/1.1[crlf]


  1. CEKLIST CEPAT

  1. PENUTUP
    Sekarang kamu punya template universal: tinggal pilih skema (ws/wss/h2c), pilih method (GET, --, dsb.), lalu ganti (SSH) dan (SNI) sesuai kepemilikan. Selamat men-crack!

#proxy #vpn