This article talks about how we can get free internet and the possible ports to be exploited:

First _  HTTP tunnel vulnerability:
What is HTTP? It is the most important Internet protocols and all websites use it to transfer data (hypertext transfer protocol or hypertext transfer protocol), and its port is usually either 80 or 8080
The most important programs that we use to exploit this tunnel are
(SSH) HTTP INJECTOR
(TCP) OPENVPN
(HTTP) DROPBEAR

# So the question here and what is the relationship of http injector and openvpn to HTTP if they use SSH and TCP protocols?
Of course, if you do not use an HTTP proxy, it will not be considered an HTTP tunnel. We usually use a proxy 80 or 8080 in order to get free internet. The thing that makes free internet is the proxy and host for free internet, not SSH and OPENVPN.
You can only run the internet using the HTTP PROXY and HOST to get free internet, but we use SSH or OPENVPN tunnel with HTTP TUNNEL to get the internet on all applications and programs.
SSH + PROXY = SSH via HTTP TUNNEL
OPENVPN + PROXY = TCPv4 / 6 via HTTP
As for Dropbear, it directly uses the HTTP Connection, meaning you can turn it on without the proxy. You must choose the appropriate ports. If your free internet works on PROXY 80 or 8080, you should choose the ports for DROPBEAR 80 or 8080.

 

Second – SSL / TLS Tunnel Vulnerability:
What is SSL or TLS? The most important Internet protocols are the security and encryption function. Most of the current sites contain SSL
The most important ports of SSL are 443, 465, 993 and 995, and there are other ports such as 25, 110 and 133.
# The most important programs are KPNTUNNL REV or HTTP INJECTOR
Other programs such as OPENVPN may be developed in the future
This tunnel is similar to SSH and DROPBEAR tunnel but it contains SSL encoded (STUNNEL)

Third –  DNS tunnel vulnerability:
What is DNS?
It is considered the most important protocol in the Internet, and its function is as a translator that converts the DOMAIN links to IPs. The most important ports are 53.
Why does this vulnerability work without HOST , which is a strong vulnerability and is a weak point in communication networks! I will give you an example, why? For example, when you don’t have internet credit and open cmd or terminal and write:
# ping www.google.com

You will get the ip of the google site, did you ask yourself how you got the ip of google or any other website and you do not have internet credit.
This is evidence that there is internet in the DNS tunnel

########################
The author of this article:

Radwan Dawood
#######################

Share

Leave a Reply