π§ͺ PANDUAN PAYLOAD HTTP INJECTOR
- PENGANTAR 30-DETIK
HTTP Injector membutuhkan 3 hal:
- Bug (SNI/host yang masih lewat bebas oleh ISP).
- Payload (string yang dikirim ke bug supaya dibelokan ke SSH).
- SSH (IP, username, password).
Yang akan kita bahas di bawah adalah bagian PAYLOAD saja.
- SKEMA PROTOKOL
Warna Skema Artinya Port Kapan dipakai
π’ h2c:// HTTP/2 cleartext 80 Kalau server bug mendukung Upgrade h2c.
π‘ ws:// WebSocket biasa 80 Umum, paling stabil di operator 3G.
π΄ wss:// WebSocket over TLS 443 Bypass DPI/penyaring berat (Telkomsel, XL).
Contoh bug lengkap:
h2c://www.i-sekai.my.idws://www.i-sekai.my.idwss://www.i-sekai.my.id
- METHOD YANG SERING DIPAKAI
A. Basic (standar HTTP)
GET
HEAD
PUT
CONNECT
POST
B. Custom (anti-dpi)
_
-
G-G
-_-
-----
Cara pakai: tinggal ganti METHOD di payload.
- HEADER PALING SERING DIPAKAI
π’ WebSocket (port 80)
Host: 128.199.x.x:22[crlf]
Connection: Upgrade[crlf]
User-Agent: [ua][crlf]
Sec-WebSocket-Key: dXP3jD9Ipw0B2EmWrMDTEw==[crlf]
Sec-WebSocket-Version: 13[crlf]
Upgrade: websocket[crlf][crlf]
π‘ HTTP2 (port 80)
Host: 128.199.x.x:22[crlf]
Connection: Upgrade, HTTP2-Settings[crlf]
HTTP2-Settings: [crlf]
Upgrade: h2c[crlf]
Alt-Svc: h2c=":80"[crlf][crlf]
π΄ Header biasa (keep-alive)
Host: www.i-sekai.my.id[crlf]
Connection: Keep-Alive[crlf]
Expect: 100-continue[crlf][crlf]
- MAIN PAYLOAD (TINGGAL SALIN)
Catatan: Ganti128.199.x.x:22dengan IP & port SSH-mu.
Ganti www.i-sekai.my.id kalau bug-mu berbeda.
5.1 CloudFront / CloudFlare CDN (WebSocket 80)
GET / HTTP/1.1[crlf]
Host: 128.199.x.x:22[crlf]
Connection: Upgrade[crlf]
User-Agent: [ua][crlf]
Sec-WebSocket-Key: dXP3jD9Ipw0B2EmWrMDTEw==[crlf]
Sec-WebSocket-Version: 13[crlf]
Upgrade: websocket[crlf][crlf]
5.2 CloudFlare Proxy SSL (wss 443)
GET wss://128.199.x.x:22/ HTTP/1.1[crlf]
Host: 128.199.x.x:22[crlf]
Connection: Upgrade[crlf]
User-Agent: [ua][crlf]
Sec-WebSocket-Key: dXP3jD9Ipw0B2EmWrMDTEw==[crlf]
Sec-WebSocket-Version: 13[crlf]
Upgrade: websocket[crlf][crlf]
5.3 Local WebSocket (bebas port)
GET / HTTP/1.1[crlf]
Host: www.i-sekai.my.id[crlf]
Connection: Upgrade[crlf]
User-Agent: [ua][crlf]
Sec-WebSocket-Key: dXP3jD9Ipw0B2EmWrMDTEw==[crlf]
Sec-WebSocket-Version: 13[crlf]
Upgrade: websocket[crlf][crlf]
- CONTOH LENGKAP SIAP PAKAI
Bug:www.i-sekai.my.id
SSH: 128.199.230.100:22
Kebutuhan: bypass Telkomsel 0p0k, pakai wss.
Hasil payload (tinggal paste di HI):
GET wss://128.199.230.100:22/ HTTP/1.1[crlf]
Host: 128.199.230.100:22[crlf]
Connection: Upgrade[crlf]
User-Agent: [ua][crlf]
Sec-WebSocket-Key: dXP3jD9Ipw0B2EmWrMDTEw==[crlf]
Sec-WebSocket-Version: 13[crlf]
Upgrade: websocket[crlf][crlf]
Note: Jika ingin pakai method βG-Gβ atau β--β cukup ganti baris pertama:
G-G wss://128.199.230.100:22/ HTTP/1.1[crlf]
- CEKLIST CEPAT
- Bug masih aktif (buka di browser β 200/404 itu OK).
- SSL/SNI sama persis dengan bug (wss β pastikan cert valid).
- Port SSH harus 22, 443, 80 atau yang diizinkan operator.
- Header WebSocket & HTTP2 boleh dicampur, asal tidak double
Host. - Selalu nyalakan βReal Hostβ atau βSNIβ di pengaturan SSL/TLS HI.
- PENUTUP
Sekarang kamu punya template universal: tinggal pilih skema (ws/wss/h2c), pilih method (GET, --, dsb.), lalu ganti (SSH) dan (SNI) sesuai kepemilikan. Selamat men-crack!