8/24/2023 0 Comments Udp2raw ipk download![]() This program sends packets via raw socket. lower-level send packet at OSI level 2, format:'if_name#dest_mac_adress' sock-buf buf size for socket, >=10 and seq increase mode for faketcp:Ģ:increase randomly, about every 3 packets (default) disable-bpf disable the kernel space filter, most time its not necessary log-position enable file name, function name, line number in log log-level 0:never 1:fatal 2:error 3:warn This option disables port changing while re-connecting source-port force source-port for raw socket, tcp/udp only source-ip force source-ip for raw socket disable-anti-replay disable anti-replay, not suggested g, -gen-rule generate iptables rule then exit a, -auto-rule auto add (and delete) iptables rule auth-mode avaliable values:md5(default), crc32, simple, none cipher-mode avaliable values:aes128cbc(default), xor, none k, -key password to gen symetric key, default:"secret key" ![]() raw-mode avaliable values:faketcp(default), udp, icmp this_program -s -l server_listen_ip:server_port -r remote_ip:remote_port Ĭommon options, these options must be same on both side: this_program -c -l local_listen_ip:local_port -r server_ip:server_port Connecting to UDP port 3333 at the client side is equivalent to connecting to port 7777 at the server side. Now, an encrypted raw tunnel has been established between client and server through TCP port 4096.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |