- Log the packet filtering - dump the packets from all interfaces #1 Figure out why packets aren't being forwarded using iptables and pr0xy
23 lines
705 B
Bash
23 lines
705 B
Bash
#!/bin/bash
|
|
set -euo pipefail
|
|
IFS=$'\n\t'
|
|
|
|
|
|
# https://websistent.com/linux-iptables-log-everything/
|
|
iptables -I INPUT 1 -s 172.16.200.10 -j NFLOG
|
|
iptables -t nat -I INPUT 1 -s 172.16.200.10 -j NFLOG
|
|
iptables -I OUTPUT 1 -j NFLOG
|
|
iptables -t nat -I OUTPUT 1 -j NFLOG
|
|
|
|
iptables -t nat -A OUTPUT -o eth0 -p tcp --dport 4444 -j ACCEPT
|
|
|
|
iptables -t nat -A OUTPUT -o eth0 -p tcp -j REDIRECT --to-ports 10080
|
|
iptables -t nat -A OUTPUT -o eth0 -p udp -m udp --dport 53 -j REDIRECT --to-port 1053
|
|
|
|
ulogd -d
|
|
tcpdump -i any -w /mount/tcp.dmp &
|
|
|
|
#python3 /opt/pr0cks/pr0cks.py --proxy socks5:172.16.200.10:4447
|
|
python3 /opt/pr0cks/pr0cks.py --proxy http:172.16.200.10:4444
|
|
#curl --proxy 172.16.200.10:4444 stats.i2p
|