• Home
  • History
  • Annotate
Name Date Size #Lines LOC

..03-May-2022-

admin/H09-Feb-2003-46,46536,841

yaph/H03-May-2022-2,1711,568

AUTHORSH A D09-Feb-2003187 96

COPYINGH A D09-Feb-200314.8 KiB281237

ChangeLogH A D09-Feb-2003120 33

INSTALLH A D09-Feb-2003448 1714

Makefile.amH A D09-Feb-20031 KiB3115

Makefile.distH A D02-Nov-2001449 1513

Makefile.inH A D09-Feb-200316.2 KiB581466

READMEH A D09-Feb-20034.4 KiB12290

TODOH A D09-Feb-2003148 64

acinclude.m4H A D09-Feb-2003157.5 KiB5,7865,125

aclocal.m4H A D09-Feb-2003160.8 KiB5,8995,221

config.h.inH A D03-May-2022291 159

configureH A D03-May-2022105.4 KiB3,5832,814

configure.filesH A D09-Feb-200316 21

configure.inH A D09-Feb-20033.1 KiB10277

configure.in.inH A D09-Feb-20033 KiB9570

special.m4.inH A D14-Jan-20023 KiB137111

stamp-h.inH A D09-Feb-20030

subdirsH A D09-Feb-20035 21

yaph.kdevprjH A D09-Feb-20032.5 KiB171144

README

1=================================================================
2YAPH - Yet Another Proxy Hunter ver 0.91 README
3
4To get full power of yaph you must have the following programs:
5Nmap			http://www.insecure.org/nmap
6ProxyChains        http://proxychains.sourceforge.net
7
8General.
9Yaph provides ability to reveal public proxy servers.
10It can search&validate socks v4 , socks v5 and http (connect method) proxy servers.
11HTTP proxy servers are checked for CONNECT method only.
12Validated proxy server is public proxy that can be used for tcp tunneling.
13While using tcp tunneling your IP address stays private.
14The best tools (proxifiers) for tcp tunneling via proxies are :
15ProxyChains (unix)	http://proxychains.sourceforge.net
16ProxyCap (win)		http://www.proxylabs.com
17
18List cheking.
19Yaph knows to check list of proxy servers to reveal working proxies.
20Supported input formats are:
211. Proxy Hunter format   ( the output of proxyhunter ) like:
22	192.168.1.2:8080@HTTP
23	192.168.1.3:8080@SOCKS4
24	192.168.1.4:8080@SOCKS5
252. Proxy Chains format  ( as it appears in proxychains.conf) like:
26	http		192.168.1.2		8080
27	socks4	192.168.1.3		1080
28	socks5	192.168.1.4		1080
29
30Network scan.
31Yaph knows to use Nmap to find new proxy servers.
32get nmap from: http://www.insecure.org/nmap
33all nmap features are usable and supported :)
34
35Stealth mode  - your IP stays unknown.
36yaph might be run with ProxyCahins to provide source IP hiding for both
37"list cheking" & "network scan"
38
39Tutorial.
40You should be root to run yaph with nmap engine!!!!!.
41To find public proxies is not a trivial task. Port scans are treated as abuse.
42Thus, scan directly from your IP address is not quite a good idea.
43However, there are "stealth" techniques to use yaph:
441. Use nmap scan with 7 or more "decoys", it will make "fake" alarms to IDS.
45	IDS will see that scan comes form many sources (IP) ,
46	while one of them is your real IP.
47	However, it is impossible to say for sure which one is originator of the scan,
48	when all "decoys" are real hosts that are "online" during the scan.
492. Use proxychains to hide your IP, while performing validation check for proxies.
50	in the logs of target host will be shown IP of proxy used, and not yours.
513. Use decoys and proxychains together, to get speed and anonymity.
52	both methods can be used together.
53
54Yet, there is "yaph.conf".
55The .conf file describes some internal configurations that may affect performance of yaph
56You may want to change there some values :)
57The .conf file is well documented also.
58Configuration file lookup is performed by yaph in the following order:
591)    ./yaph.conf
602)    /etc/yaph.conf
61
62
63
64Some examples for stealth scans:
65
66proxychains yaph -D10.1.1.2,10.2.5.1,10.1.3.2,10.2.5.4 10.0.0.*
67
68	in this example, nmap will scan hosts 10.0.0.1 to 10.0.0.255
69	loking for onpen ports 1080,8080,3128
70	with decoys 10.1.1.2 10.2.5.1 10.1.3.2 10.2.5.4
71	and then validation of open ports will be performed via proxy server
72	defined in proxychains.conf
73
74cat proxy_list.txt | sort | uniq | proxychains yaph --use_hunter_stdin
75
76	in this example, yaph wil validate addresses,
77	listed in proxy_list in proxyhunter syntax,
78	via proxy server defined in proxychains.conf.
79       sort & uniq is useful when your list contains not only unique targets
80       (some tagrets appear more than once) - it will check only unique targets
81
82proxychains yaph -sT -P0 10.0.0.*
83
84	in this example EVERYTHING will go via proxyserver.
85	The nmap scan will go through proxy server!!!
86	Validation of open ports as well
87	scanned hosts are 10.0.0.1 - 10.0.0.255
88	(this is slow, but your IP is never appears in the logs of scanned hosts)
89
90
91Miscelanious examples:
92
93proxychains yaph --use_chains_stdin
94
95       in this example interactive mode is used.
96       just type on your console targets in proxychains format
97       hint: "type" can be "any" to do all checks fot given port
98       like:
99              any 192.168.35.46 5041
100       will check this host:port  for http, socks4 and socks5 proxy
101
102proxychains yaph --use_chains_stdin
103
104       in this example interactive mode is used.
105       just type on your console targets in proxyhunter format
106       hint: "type" can be "any" to do all checks fot given port
107       like:
108              192.168.35.46:5041@ANY
109       will check this host:port  for http, socks4 and socks5 proxy
110
111Hint:
112     If you are using proxychains set it to "random chain" for more performance
113=========================================================
114
115
116
117
118
119
120
121
122