You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-[redirect (via NAT and SO_ORIGINAL_DST)](#redirect-via-nat-and-so_original_dst)
22
23
-[tproxy (via MANGLE and IP_TRANSPARENT)](#tproxy-via-mangle-and-ip_transparent)
23
-
-[UDP support](#udp-support)
24
24
-[ARP spoofing](#arp-spoofing)
25
+
-[UDP support](#udp-support)
25
26
-[Traffic sniffing](#traffic-sniffing)
26
27
-[JSON format](#json-format)
27
28
-[Colored format](#colored-format)
@@ -385,6 +386,8 @@ iptables -t nat -X GOHPTS
385
386
386
387
### Auto configuration for `redirect` mode
387
388
389
+
[[Back]](#table-of-contents)
390
+
388
391
To configure your system automatically, run the following command:
389
392
390
393
```shell
@@ -456,6 +459,8 @@ ip link del veth1
456
459
457
460
### Auto configuration for `tproxy` mode
458
461
462
+
[[Back]](#table-of-contents)
463
+
459
464
To configure your system automatically, run the following command (for example, on a separate VM):
460
465
461
466
```shell
@@ -494,6 +499,8 @@ fi
494
499
495
500
### ARP spoofing
496
501
502
+
[[Back]](#table-of-contents)
503
+
497
504
`GoHPTS` has in-built ARP spoofer that can be used to make all TCP talking devices of your LAN to use proxy server to connect to the Internet.
498
505
This is achieved by adding `-arpspoof` flag with couple of parameters, separated by semicolon.
499
506
@@ -528,6 +535,8 @@ Check proxy logs for traffic from other devices from your LAN
528
535
529
536
### UDP support
530
537
538
+
[[Back]](#table-of-contents)
539
+
531
540
`GoHPTS` has UDP support that can be enabled in`tproxy` mode. For this setup to work you need to connect to a socks5 server capable of serving UDP connections (`UDP ASSOCIATE`). For example, you can use [https://github.com/wzshiming/socks5](https://github.com/wzshiming/socks5) to deploy UDP capable socks5 server on some remote or local machine. Once you have the server to connect to, run the following command:
532
541
533
542
```shell
@@ -548,7 +557,7 @@ To test it locally, you can combine UDP transparent proxy with `-arpspoof` flag.
You can see the example of colored output in the picture above. In this mode, `GoHPTS` tries to highlight import information such as TLS Handshake, HTTP metadata, something that looks line login/passwords or different types of auth and secret tokens. The output is limited comparing to JSON but way easier to readfor humans.
@@ -723,6 +734,16 @@ Learn more about transparent proxies by visiting the following links:
0 commit comments