-
Notifications
You must be signed in to change notification settings - Fork 1
/
index.html
157 lines (114 loc) · 7.55 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
<!DOCTYPE html>
<html>
<head>
<meta charset='utf-8'>
<meta http-equiv="X-UA-Compatible" content="chrome=1">
<meta name="viewport" content="width=device-width, initial-scale=1, maximum-scale=1">
<link href='https://fonts.googleapis.com/css?family=Architects+Daughter' rel='stylesheet' type='text/css'>
<link rel="stylesheet" type="text/css" href="stylesheets/stylesheet.css" media="screen">
<link rel="stylesheet" type="text/css" href="stylesheets/github-light.css" media="screen">
<link rel="stylesheet" type="text/css" href="stylesheets/print.css" media="print">
<!--[if lt IE 9]>
<script src="//html5shiv.googlecode.com/svn/trunk/html5.js"></script>
<![endif]-->
<title>Layerprox by flipchan</title>
</head>
<body>
<header>
<div class="inner">
<h1>Layerprox</h1>
<h2>a rebuild of marionette, an encrypted traffic obfuscation proxy, simulates general webtraffic</h2>
<a href="https://github.com/flipchan/LayerProx" class="button"><small>View project on</small> GitHub</a>
</div>
</header>
<div id="content-wrapper">
<div class="inner clearfix">
<section id="main-content">
<h1>
<a id="layerprox" class="anchor" href="#layerprox" aria-hidden="true"><span aria-hidden="true" class="octicon octicon-link"></span></a>LayerProx</h1>
<p>A rebuild of marionette, encrypted proxy that simulates general webtraffic.</p>
<p>Makes Real looking http packages, to avoid censorship why not make the
data look like social media or something other?</p>
<p>LayerProx takes the orignal data and encrypts it and makes it look like
http. At the moment I have implemented ebay, amazon, facebook etc.. plugins to
generate http requests that looks like you are just visiting a popular site
while you are really looking at something else or useing another protocol</p>
<p>Stronger than a vpn, Smarter than a proxy.</p>
<p>LayerProx believes in Privacy so it comes with a Warrant Canary</p>
<p><strong>Provides strong end to end encryption with PGP + AES-CTR + HMACSHA256</strong></p>
<h2>
<a id="whats-is-uniq-with-layerprox" class="anchor" href="#whats-is-uniq-with-layerprox" aria-hidden="true"><span aria-hidden="true" class="octicon octicon-link"></span></a>Whats is uniq with layerprox?</h2>
<p>a normal obfusciation system makes the data look like random http data.
this projects makes it look like the packages are goin to facebook, ebay etc.
This project makes the packages look like user a visit site b. but user a is really visits site c
By doing this we bypass deep package inspection systems(the data just looks like regular traffic) and the encryption
protects against deep package injection</p>
<p>encryption: pgp + aes-ctr + hmac</p>
<p>each user has its uniq keys for the crypto with a expire date to help improve security</p>
<h2>
<a id="currently-works-onwith" class="anchor" href="#currently-works-onwith" aria-hidden="true"><span aria-hidden="true" class="octicon octicon-link"></span></a>Currently works on/with:</h2>
<p>Debian 7-8, kali 1-2, mac osx, windows 7, raspberry pi(raspbian jessie)
and also works with proxychains so you can proxy applications through it</p>
<h2>
<a id="version-2" class="anchor" href="#version-2" aria-hidden="true"><span aria-hidden="true" class="octicon octicon-link"></span></a>Version 2:</h2>
<p>version 2 will be out soon here is the new features:
connections go like this:</p>
<div class="highlight highlight-text-shell-session"><pre><span class="pl-mo">you/user -> Tor -> LayerProx client -> LayerProx server</span></pre></div>
<p>public LayerProx server will come up soon</p>
<p>have been added:
crypto sys: pgp + aes-ctr + hmac</p>
<h2>
<a id="install" class="anchor" href="#install" aria-hidden="true"><span aria-hidden="true" class="octicon octicon-link"></span></a>install:</h2>
<p>python setup.py
create a test user on the client and server and then make pgp keys for those two</p>
<h2>
<a id="what-is-layerprox" class="anchor" href="#what-is-layerprox" aria-hidden="true"><span aria-hidden="true" class="octicon octicon-link"></span></a>What is LayerProx?</h2>
<div class="highlight highlight-text-shell-session"><pre><span class="pl-mo">LayerProx is an advanced easy to reprogram proxy</span>
<span class="pl-mo">LayerProx operates like this:</span>
<span class="pl-mo">you set up a server and client machine you then proxy your </span>
<span class="pl-mo">connection to the client machine useing a socks4a proxy. </span>
<span class="pl-mo">The data then gets encrypted in multiple Layers to </span>
<span class="pl-mo">provide strong end to end encryption. the encryption:</span>
<span class="pl-mo">orignal data --> fte cipher --> scrypt --> pgp --> chacha20_poly1305 --> fte cipher + the spoofed http data </span>
<span class="pl-mo">so the data will look like we are just browseing the webb or looking </span>
<span class="pl-mo">at cute cat pictures.</span>
<span class="pl-mo">LayerProx is the first project in the world which </span>
<span class="pl-mo">implements "real http spoofing" </span>
<span class="pl-mo">meaning that you can press on the generated http link and </span>
<span class="pl-mo">actually get somewhere </span>
<span class="pl-mo">Why i have added different layers of encryption is to make the </span>
<span class="pl-mo">end to end encryption really strong </span>
<span class="pl-mo">on alot of other applications they have just implemented one crypto</span>
<span class="pl-mo">so if the mitm-attacker gets our data he will only need to decrypt one layer</span>
<span class="pl-mo">But here i have added multiple layers so the attack will have to work </span>
<span class="pl-mo">him/her self through multiple layers of encryption.</span>
<span class="pl-mo">i have(tried) to make it really easy for anyone to modify and rebuild this</span>
<span class="pl-mo">so if you feel like changeing the encryption to diffie hellman or something</span>
<span class="pl-mo">else it is easy to do so</span>
</pre></div>
<h2>
<a id="start" class="anchor" href="#start" aria-hidden="true"><span aria-hidden="true" class="octicon octicon-link"></span></a>start:</h2>
<div class="highlight highlight-text-shell-session"><pre><span class="pl-mo">./bin/marionette_server --server_ip 0.0.0.0 --proxy_ip 0.0.0.0 --proxy_port 8081 --format custom/ebay --debug</span>
<span class="pl-mo"> ./bin/marionette_client --server_ip 0.0.0.0 --client_ip 127.0.0.1 --client_port 8079 --format custom/ebay --debug</span>
<span class="pl-mo">./bin/socksserver --local_port 8081</span>
<span class="pl-mo"> curl --socks4a 127.0.0.1:8079 example.com</span></pre></div>
<p>0.0.0.0 to bind all interfaces </p>
<p><strong>See documenation folder for more documentation and how to guides</strong></p>
<p>LayerProx is based on <a href="https://github.com/marionette-tg/marionette">https://github.com/marionette-tg/marionette</a></p>
</section>
<aside id="sidebar">
<a href="https://github.com/flipchan/LayerProx/zipball/master" class="button">
<small>Download</small>
.zip file
</a>
<a href="https://github.com/flipchan/LayerProx/tarball/master" class="button">
<small>Download</small>
.tar.gz file
</a>
<p class="repo-owner"><a href="https://github.com/flipchan/LayerProx"></a> is maintained by <a href="https://github.com/flipchan">flipchan</a>.</p>
<p>This page was generated by <a href="https://pages.github.com">GitHub Pages</a> using the Architect theme by <a href="https://twitter.com/jasonlong">Jason Long</a>.</p>
</aside>
</div>
</div>
</body>
</html>