Documente Academic
Documente Profesional
Documente Cultură
Urutan penggunaan:
1. Silahkan pilih salah satu
*service_install_dnsredir (dengan atau tanpa pilihan dns)
*service_install_dnsredir_blacklist (dengan atau tanpa pilihan dns)
2. Jalankan dengan membuka file
*run_dnsredir.cmd (dengan atau tanpa pilihan dns)
3. Uninstall jika telah selesai menggunakan
*service_remove.cmd
Manual penggunaan:
goodbyedpi.exe [OPTION...]
-p block passive DPI
-r replace Host with hoSt
-s remove space between host header and its value
-m mix Host header case (test.com -> tEsT.cOm)
-f [value] set HTTP fragmentation to value
-k [value] enable HTTP persistent (keep-alive) fragmentation and set it to value
-n do not wait for first segment ACK when -k is enabled
-e [value] set HTTPS fragmentation to value
-a additional space between Method and Request-URI (enables -s, may break
sites)
-w try to find and parse HTTP traffic on all processed ports (not only on
port 80)
--port [value] additional TCP port to perform fragmentation on (and HTTP
tricks with -w)
--ip-id [value] handle additional IP ID (decimal, drop redirects and TCP
RSTs with this ID).
This option can be supplied multiple times.
--dns-addr [value] redirect UDP DNS requests to the supplied IP address
(experimental)
--dns-port [value] redirect UDP DNS requests to the supplied port (53 by
default)
--dnsv6-addr [value] redirect UDPv6 DNS requests to the supplied IPv6 address
(experimental)
--dnsv6-port [value] redirect UDPv6 DNS requests to the supplied port (53 by
default)
--dns-verb print verbose DNS redirection messages
--blacklist [txtfile] perform HTTP tricks only to host names and subdomains
from
supplied text file. This option can be supplied multiple
times.
--set-ttl [value] activate Fake Request Mode and send it with supplied TTL
value.
DANGEROUS! May break websites in unexpected ways. Use
with care.
--wrong-chksum activate Fake Request Mode and send it with incorrect TCP
checksum.
May not work in a VM or with some routers, but is safer
than set-ttl.