Home
Forums
New posts
Search forums
What's new
New posts
New profile posts
Latest activity
Members
Current visitors
New profile posts
Search profile posts
Log in
Register
What's new
Search
Search
Search titles only
By:
New posts
Search forums
Menu
Log in
Register
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Home
Forums
CARDING & HACKING
Anonimity & Security
Combating IP leakage via WebRTC
Message
<blockquote data-quote="Prime" data-source="post: 231" data-attributes="member: 18"><p>Today I want to touch on a now-dead topic, namely WebRTC. I won't tell you how to block it. There are many different plugins and ways to disable it manually.</p><p>This article is dedicated to people who need WebRTC while "working" or do not want to make sites angry with the plugin turned off. This article will focus on WebRTC deception.</p><p></p><p><img src="https://cryptoworld.su/wp-content/uploads/2016/02/webrtc-leak-1.png" alt="webrtc-leak-1.png" class="fr-fic fr-dii fr-draggable " style="" /></p><p></p><p></p><p>Well that. Start.</p><p>To do this, we need to have:</p><p>A virtual machine running on Windows XP, 7, 8, 8.1.</p><p>The VPN (if any) must be on the main machine(only tunnels or socks on the virtual machine).</p><p>And a configured firewall.</p><p></p><p>The setup is divided into several parts.</p><p><strong>PART ONE: INSTALLING AND CONFIGURING THE FIREWALL[UPD]</strong></p><p></p><ul> <li data-xf-list-type="ul">Go to the control panel.</li> </ul><p></p><p><img src="https://cryptoworld.su/wp-content/uploads/2016/02/0dfa9c36b7e4.png" alt="0dfa9c36b7e4.png" class="fr-fic fr-dii fr-draggable " style="" /></p><p></p><p></p><ul> <li data-xf-list-type="ul">Click on "Advanced settings".</li> </ul><p></p><p><img src="https://cryptoworld.su/wp-content/uploads/2016/02/47712cb1b2aa.jpg" alt="47712cb1b2aa.jpg" class="fr-fic fr-dii fr-draggable " style="" /></p><p></p><p></p><ul> <li data-xf-list-type="ul">Next, click on "Windows Firewall Properties".</li> </ul><p></p><p><img src="https://cryptoworld.su/wp-content/uploads/2016/02/e7098b0a5524.jpg" alt="e7098b0a5524.jpg" class="fr-fic fr-dii fr-draggable " style="" /></p><p></p><p></p><ul> <li data-xf-list-type="ul">Next, in all three tabs, specify in "Outbound connections: Block".</li> </ul><p></p><p><img src="https://cryptoworld.su/wp-content/uploads/2016/02/1482f4ee6a8f.jpg" alt="1482f4ee6a8f.jpg" class="fr-fic fr-dii fr-draggable " style="" /></p><p></p><p></p><ul> <li data-xf-list-type="ul">Next, go to Outbound Rules and click on New Rule.</li> </ul><p><img src="https://cryptoworld.su/wp-content/uploads/2016/02/b6b98e121b83.jpg" alt="b6b98e121b83.jpg" class="fr-fic fr-dii fr-draggable " style="" /></p><p></p><p></p><ul> <li data-xf-list-type="ul"><strong>Select "Program".</strong></li> </ul><p></p><p><img src="https://cryptoworld.su/wp-content/uploads/2016/02/3a314d431363.jpg" alt="3a314d431363.jpg" class="fr-fic fr-dii fr-draggable " style="" /></p><p></p><p></p><ul> <li data-xf-list-type="ul">We specify the application that should go online(Bitvise, proxyfier).</li> </ul><p>However, do not forget that the main application can use auxiliary ones to connect to tunnels or socks(usually putty or plink in the folder with the main application), they will also need to be added to exceptions. If you have a problem at this stage, you can contact me at Toad for help.</p><p></p><p><img src="https://cryptoworld.su/wp-content/uploads/2016/02/1dd8b0c89e0b.jpg" alt="1dd8b0c89e0b.jpg" class="fr-fic fr-dii fr-draggable " style="" /></p><p></p><p></p><ul> <li data-xf-list-type="ul"><strong>Specify "Allow the connection".</strong></li> </ul><p></p><p><img src="https://cryptoworld.su/wp-content/uploads/2016/02/97f597f6f421.jpg" alt="97f597f6f421.jpg" class="fr-fic fr-dii fr-draggable " style="" /></p><p></p><p></p><ul> <li data-xf-list-type="ul">Next, set the network name and close the setting.<br /> In our case, we are trying to connect to the Internet using "Bitvise" and tunnels.<br /> If everything is done correctly, then WebRTC will only show us the internal network IP without an external one.</li> </ul><p>It should look something like this:</p><p></p><p><img src="https://cryptoworld.su/wp-content/uploads/2016/02/8c47dd62de4c.png" alt="8c47dd62de4c.png" class="fr-fic fr-dii fr-draggable " style="" /></p><p></p><p></p><ul> <li data-xf-list-type="ul">If this is the case, then everything is fine. Now we need WebRTC to show us the IP address we need.</li> </ul><p></p><p><strong>PART TWO: CONFIGURING THE LOOPBACK ADAPTER</strong></p><p></p><p>SETUP FOR WINDOWS XP</p><p>A small update. Who has a Windows XP loopback adapter can be installed like this:</p><p><a href="https://support.microsoft.com/en-us/kb/839013/ru" target="_blank">https://support.microsoft.com/en-us/kb/839013/ru</a></p><p>In Russian</p><p><a href="https://support.microsoft.com/en-us/kb/839013" target="_blank">https://support.microsoft.com/en-us/kb/839013</a></p><p>In English</p><p></p><ul> <li data-xf-list-type="ul">Now we need to create a loopback adapter to fool WebRTC.To do this, go to the hardware manager and select "Add legacy hardware" in the "Action" menu by first clicking on the "Network adapters" section.</li> <li data-xf-list-type="ul"><img src="https://cryptoworld.su/wp-content/uploads/2016/02/8f46f6b0be0c.png" alt="8f46f6b0be0c.png" class="fr-fic fr-dii fr-draggable " style="" /><br /> <br /> <ul> <li data-xf-list-type="ul">Choose manual installation.</li> <li data-xf-list-type="ul">Select "Network adapters".</li> </ul></li> <li data-xf-list-type="ul"><br /> <img src="https://cryptoworld.su/wp-content/uploads/2016/02/821cc75a301a.png" alt="821cc75a301a.png" class="fr-fic fr-dii fr-draggable " style="" /><br /> <br /> <ul> <li data-xf-list-type="ul">Select "Microsoft" and select "Microsoft Loopback Adapter".</li> </ul></li> <li data-xf-list-type="ul"><br /> <img src="https://cryptoworld.su/wp-content/uploads/2016/02/2f9b311995db.png" alt="2f9b311995db.png" class="fr-fic fr-dii fr-draggable " style="" /><br /> <br /> <ul> <li data-xf-list-type="ul">After installation, go to the settings of this adapter. And specify in its properties the IP that showed us Whoer. In my case it is 64.53.67.252:</li> </ul></li> <li data-xf-list-type="ul"><u>Spoiler alert</u><ul> <li data-xf-list-type="ul">Then save and run the command line.<br /> In the command line, write the following:</li> </ul></li> <li data-xf-list-type="ul">Code:<br /> routeadd ( )mask255.255.255.255 (defaultgateway) metric 1<br /> <br /> To find out the Default gateway, enter "ipconfig"in the command line. If the line is empty, look for the gateway address in the virtual machine network settings.<br /> In my case, I enter in the command line<br /> <br /> Code:<br /> route add 64.53.67.252 mask 255.255.255.255 192.168.111.2 metric 1<br /> <ul> <li data-xf-list-type="ul">If everything is OK, then the command line will respond =)<br /> If you get an error with the text "The requested operation requires elevation", then run the command line as an administrator.</li> </ul></li> <li data-xf-list-type="ul"><strong>OPERATION ALGORITHM</strong><ul> <li data-xf-list-type="ul">Delete the old rule with the command</li> </ul></li> <li data-xf-list-type="ul">Code:<br /> routedelete ( )mask255.255.255.255 (defaultgateway) metric 1<ul> <li data-xf-list-type="ul">You set a new rule with the command</li> </ul></li> <li data-xf-list-type="ul">Code:<br /> routeadd ( )mask255.255.255.255 (defaultgateway) metric 1<br /> <br /> Specify the IP shown in Whoer in the adapter<br /> <br /> Specify the IP shown in Whoer in the adapter<br /> <br /> <img src="https://cryptoworld.su/wp-content/uploads/2016/02/47ebb4025481.png" alt="47ebb4025481.png" class="fr-fic fr-dii fr-draggable " style="" /><br /> <br /> <ul> <li data-xf-list-type="ul">Now we stomp on Whoer.net.<ul> <li data-xf-list-type="ul">We refresh the page a couple of times and if everything is OK then the following will happen:</li> </ul></li> <li data-xf-list-type="ul"><br /> <img src="https://cryptoworld.su/wp-content/uploads/2016/02/37e0c1c5ecc3.png" alt="37e0c1c5ecc3.png" class="fr-fic fr-dii fr-draggable " style="" /><br /> <br /> <ul> <li data-xf-list-type="ul">We believe our eyes and go check in another place.<br /> <a href="https://diafygi.github.io/webrtc-ips/" target="_blank">https://diafygi.github.io/webrtc-ips/</a></li> </ul></li> <li data-xf-list-type="ul"><br /> <strong>The result is the same:</strong><br /> <br /> <img src="https://cryptoworld.su/wp-content/uploads/2016/02/8faddb7f2d82.png" alt="8faddb7f2d82.png" class="fr-fic fr-dii fr-draggable " style="" /><br /> <br /> <br /> Ready!<br /> <br /> You can disable WebRTC in Chrome by using the "WebRTC Leak Prevent" app, which is available in the Chrome Web Store. To cheat, it is enough to raise the second NAT.<ul> <li data-xf-list-type="ul">Automatic replacement. I checked for Bitvise + Proxifier on three tunnels and always changed as it should. But it didn't work for me with the Proxifier Portable version, I twisted it in different ways, and for plinkera it is better to use it. Someone also identified the wrong address. Everything is individual and depends on the configuration of your system.<br /> download <a href="http://rghost.ru/8GmDcMhf7" target="_blank">http://rghost.ru/8GmDcMhf7</a></li> <li data-xf-list-type="ul">Automatic replacement No.2. Redesigned an existing program using a different connection method. Using Proxifier, Portable already synced with the site to check the address and change it on the network adapter. I tested three tunnels, but for some reason I found the wrong address on one of them, but in the same subnet.<br /> скачать <a href="https://www.sendspace.com/file/3tokwr" target="_blank">https://www.sendspace.com/file/3tokwr</a></li> <li data-xf-list-type="ul">Semi-automatic replacement, with handles, but also in one click. In my case, this method was suitable, since I had practically used it before, only editing two bat files and entering everything manually. Well, there is no synchronization with the site, so you don't need to reinstall anything, work on your already configured clients.<br /> <br /> Code:<br /> @Echo off<br /> title WebRTC Changer<br /> echo Enter SSH IP:<br /> set /p ip=^><br /> cls<br /> @Echo on<br /> netsh interface ip set address "lan" static %ip% 255.255.255.0<br /> route add %ip% mask 255.255.255.255 192.168.1.1 metric 1<br /> echo Complete!<br /> pause<br /> Download all in one archive: <a href="https://www.sendspace.com/file/de69b2" target="_blank">https://www.sendspace.com/file/de69b2</a><br /> <br /> (c) <a href="https://cryptoworld.su/%D0%B1%D0%BE%D1%80%D1%8C%D0%B1%D0%B0-%D1%81-%D1%83%D1%82%D0%B5%D1%87%D0%BA%D0%BE%D0%B9-ip-%D1%87%D0%B5%D1%80%D0%B5%D0%B7-webrtc/" target="_blank">https://cryptoworld.su/борьба-с-утечкой-ip-через-webrtc/</a></li> </ul></li> </ul></li> </ul></blockquote><p></p>
[QUOTE="Prime, post: 231, member: 18"] Today I want to touch on a now-dead topic, namely WebRTC. I won't tell you how to block it. There are many different plugins and ways to disable it manually. This article is dedicated to people who need WebRTC while "working" or do not want to make sites angry with the plugin turned off. This article will focus on WebRTC deception. [IMG alt="webrtc-leak-1.png"]https://cryptoworld.su/wp-content/uploads/2016/02/webrtc-leak-1.png[/IMG] Well that. Start. To do this, we need to have: A virtual machine running on Windows XP, 7, 8, 8.1. The VPN (if any) must be on the main machine(only tunnels or socks on the virtual machine). And a configured firewall. The setup is divided into several parts. [B]PART ONE: INSTALLING AND CONFIGURING THE FIREWALL[UPD][/B] [LIST] [*]Go to the control panel. [/LIST] [IMG alt="0dfa9c36b7e4.png"]https://cryptoworld.su/wp-content/uploads/2016/02/0dfa9c36b7e4.png[/IMG] [LIST] [*]Click on "Advanced settings". [/LIST] [IMG alt="47712cb1b2aa.jpg"]https://cryptoworld.su/wp-content/uploads/2016/02/47712cb1b2aa.jpg[/IMG] [LIST] [*]Next, click on "Windows Firewall Properties". [/LIST] [IMG alt="e7098b0a5524.jpg"]https://cryptoworld.su/wp-content/uploads/2016/02/e7098b0a5524.jpg[/IMG] [LIST] [*]Next, in all three tabs, specify in "Outbound connections: Block". [/LIST] [IMG alt="1482f4ee6a8f.jpg"]https://cryptoworld.su/wp-content/uploads/2016/02/1482f4ee6a8f.jpg[/IMG] [LIST] [*]Next, go to Outbound Rules and click on New Rule. [/LIST] [IMG alt="b6b98e121b83.jpg"]https://cryptoworld.su/wp-content/uploads/2016/02/b6b98e121b83.jpg[/IMG] [LIST] [*][B]Select "Program".[/B] [/LIST] [IMG alt="3a314d431363.jpg"]https://cryptoworld.su/wp-content/uploads/2016/02/3a314d431363.jpg[/IMG] [LIST] [*]We specify the application that should go online(Bitvise, proxyfier). [/LIST] However, do not forget that the main application can use auxiliary ones to connect to tunnels or socks(usually putty or plink in the folder with the main application), they will also need to be added to exceptions. If you have a problem at this stage, you can contact me at Toad for help. [IMG alt="1dd8b0c89e0b.jpg"]https://cryptoworld.su/wp-content/uploads/2016/02/1dd8b0c89e0b.jpg[/IMG] [LIST] [*][B]Specify "Allow the connection".[/B] [/LIST] [IMG alt="97f597f6f421.jpg"]https://cryptoworld.su/wp-content/uploads/2016/02/97f597f6f421.jpg[/IMG] [LIST] [*]Next, set the network name and close the setting. In our case, we are trying to connect to the Internet using "Bitvise" and tunnels. If everything is done correctly, then WebRTC will only show us the internal network IP without an external one. [/LIST] It should look something like this: [IMG alt="8c47dd62de4c.png"]https://cryptoworld.su/wp-content/uploads/2016/02/8c47dd62de4c.png[/IMG] [LIST] [*]If this is the case, then everything is fine. Now we need WebRTC to show us the IP address we need. [/LIST] [B]PART TWO: CONFIGURING THE LOOPBACK ADAPTER[/B] SETUP FOR WINDOWS XP A small update. Who has a Windows XP loopback adapter can be installed like this: [URL]https://support.microsoft.com/en-us/kb/839013/ru[/URL] In Russian [URL]https://support.microsoft.com/en-us/kb/839013[/URL] In English [LIST] [*]Now we need to create a loopback adapter to fool WebRTC.To do this, go to the hardware manager and select "Add legacy hardware" in the "Action" menu by first clicking on the "Network adapters" section. [*][IMG alt="8f46f6b0be0c.png"]https://cryptoworld.su/wp-content/uploads/2016/02/8f46f6b0be0c.png[/IMG] [LIST] [*]Choose manual installation. [*]Select "Network adapters". [/LIST] [*] [IMG alt="821cc75a301a.png"]https://cryptoworld.su/wp-content/uploads/2016/02/821cc75a301a.png[/IMG] [LIST] [*]Select "Microsoft" and select "Microsoft Loopback Adapter". [/LIST] [*] [IMG alt="2f9b311995db.png"]https://cryptoworld.su/wp-content/uploads/2016/02/2f9b311995db.png[/IMG] [LIST] [*]After installation, go to the settings of this adapter. And specify in its properties the IP that showed us Whoer. In my case it is 64.53.67.252: [/LIST] [*][U]Spoiler alert[/U] [LIST] [*]Then save and run the command line. In the command line, write the following: [/LIST] [*]Code: routeadd ( )mask255.255.255.255 (defaultgateway) metric 1 To find out the Default gateway, enter "ipconfig"in the command line. If the line is empty, look for the gateway address in the virtual machine network settings. In my case, I enter in the command line Code: route add 64.53.67.252 mask 255.255.255.255 192.168.111.2 metric 1 [LIST] [*]If everything is OK, then the command line will respond =) If you get an error with the text "The requested operation requires elevation", then run the command line as an administrator. [/LIST] [*][B]OPERATION ALGORITHM[/B] [LIST] [*]Delete the old rule with the command [/LIST] [*]Code: routedelete ( )mask255.255.255.255 (defaultgateway) metric 1 [LIST] [*]You set a new rule with the command [/LIST] [*]Code: routeadd ( )mask255.255.255.255 (defaultgateway) metric 1 Specify the IP shown in Whoer in the adapter Specify the IP shown in Whoer in the adapter [IMG alt="47ebb4025481.png"]https://cryptoworld.su/wp-content/uploads/2016/02/47ebb4025481.png[/IMG] [LIST] [*]Now we stomp on Whoer.net. [LIST] [*]We refresh the page a couple of times and if everything is OK then the following will happen: [/LIST] [*] [IMG alt="37e0c1c5ecc3.png"]https://cryptoworld.su/wp-content/uploads/2016/02/37e0c1c5ecc3.png[/IMG] [LIST] [*]We believe our eyes and go check in another place. [URL]https://diafygi.github.io/webrtc-ips/[/URL] [/LIST] [*] [B]The result is the same:[/B] [IMG alt="8faddb7f2d82.png"]https://cryptoworld.su/wp-content/uploads/2016/02/8faddb7f2d82.png[/IMG] Ready! You can disable WebRTC in Chrome by using the "WebRTC Leak Prevent" app, which is available in the Chrome Web Store. To cheat, it is enough to raise the second NAT. [LIST] [*]Automatic replacement. I checked for Bitvise + Proxifier on three tunnels and always changed as it should. But it didn't work for me with the Proxifier Portable version, I twisted it in different ways, and for plinkera it is better to use it. Someone also identified the wrong address. Everything is individual and depends on the configuration of your system. download [URL]http://rghost.ru/8GmDcMhf7[/URL] [*]Automatic replacement No.2. Redesigned an existing program using a different connection method. Using Proxifier, Portable already synced with the site to check the address and change it on the network adapter. I tested three tunnels, but for some reason I found the wrong address on one of them, but in the same subnet. скачать [URL]https://www.sendspace.com/file/3tokwr[/URL] [*]Semi-automatic replacement, with handles, but also in one click. In my case, this method was suitable, since I had practically used it before, only editing two bat files and entering everything manually. Well, there is no synchronization with the site, so you don't need to reinstall anything, work on your already configured clients. Code: @Echo off title WebRTC Changer echo Enter SSH IP: set /p ip=^> cls @Echo on netsh interface ip set address "lan" static %ip% 255.255.255.0 route add %ip% mask 255.255.255.255 192.168.1.1 metric 1 echo Complete! pause Download all in one archive: [URL]https://www.sendspace.com/file/de69b2[/URL] (c) [URL='https://cryptoworld.su/%D0%B1%D0%BE%D1%80%D1%8C%D0%B1%D0%B0-%D1%81-%D1%83%D1%82%D0%B5%D1%87%D0%BA%D0%BE%D0%B9-ip-%D1%87%D0%B5%D1%80%D0%B5%D0%B7-webrtc/']https://cryptoworld.su/борьба-с-утечкой-ip-через-webrtc/[/URL] [/LIST] [/LIST] [/LIST] [/QUOTE]
Name
Verification
Post reply
Home
Forums
CARDING & HACKING
Anonimity & Security
Combating IP leakage via WebRTC
Top