The Most Active and Friendliest
Affiliate Marketing Community Online!

“Adavice”/  “CPA

Ask Me Anything Private proxy-cloaker FREE!

Graybeard

Well-Known Member
This how I made a reverse tunnel SSH SOCKS5 proxy for my browser today with no proxy server software to install;

  • User should be normal user (not root) for security
  • Open up the firewall port on the server (if closed) (8888 example) any port not in use 5000-13000 should work fine
  • Open a terminal (on LINUX, Mac?) or Putty on Windows\
  • Then ssh to your server (see ssh command below)
  • The following works on LINUX Ubuntu 18.04 localhost and Ubuntu 16.04 remote server (shell)
Terminal#1:
Code:
$ ssh -ND 8888 user@shell.example.net
#if you  do -vvv it will debug and tell you all the data points (see hacking)
$ ssh -ND 8888 user@shell.example.net -vvv

Then start chromium as follows: (should work with (some variable of) Chrome as the command in a separate terminal)
Terminal #2:
Code:
chromium-browser --proxy-server="socks://localhost:8888"

You will have a data-center IP so Google will see you as a proxy and you will get a national location (not local). Also, you will get recaptcha at times

You may want to try this if you need to be seen as in another country for legitimate reasons ...

Is This CLOAKING :D

ssh tunnel and socks proxy error: empty reply from server
SSH dynamic forwarding proxy - "No data received" in chrome
If ssh connection fails using SOCKS then what? Automate switch to no proxy?
SSH Tunnelling for HTTP: Does target HTTP Proxy Port have to be exposed?
How does reverse SSH tunneling work?
 
Last edited:
so I wanted to try Outbrain with their astounding anti bot technology
(Disclaimer: I am a person using a known data center IP as a proxy -- for all they know I could be a Cambodian :p with a US IP address)

>>>log
debug1: channel 51: free: direct-tcpip: listening port 6769 for wazimo-d.openx.net port 443, connect from ::1 port 40672 to ::1 port 6769, nchannels 22
debug3: channel 51: status: The following connections are open:
#2 direct-tcpip: listening port 6769 for search.spotxchange.com port 443, connect from ::1 port 40978 to ::1 port 6769 (t4 r1 i0/0 o0/0 fd 6/6 cc -1)
#3 dynamic-tcpip (t13 nr0 i0/0 o0/0 fd 7/7 cc -1)
#4 direct-tcpip: listening port 6769 for events.crazyclickstats.com port 443, connect from ::1 port 40992 to ::1 port 6769 (t4 r0 i0/0 o0/0 fd 8/8 cc -1)
#5 direct-tcpip: listening port 6769 for news.google.com port 443, connect from ::1 port 40980 to ::1 port 6769 (t4 r2 i0/0 o0/0 fd 9/9 cc -1)
#6 direct-tcpip: listening port 6769 for pixel.tapad.com port 443, connect from ::1 port 40952 to ::1 port 6769 (t4 r3 i0/0 o0/0 fd 10/10 cc -1)
#7 direct-tcpip: listening port 6769 for www.facebook.com port 443, connect from ::1 port 40994 to ::1 port 6769 (t4 r4 i0/0 o0/0 fd 11/11 cc -1)
#8 direct-tcpip: listening port 6769 for www.coolimba.com port 443, connect from ::1 port 40996 to ::1 port 6769 (t4 r5 i0/0 o0/0 fd 12/12 cc -1)<<<

www.coolimba.com is the outbrain ad I was sent to ... Someone paid for my proxy clicks :eek: good luck to the winners :)

is this called decloaking :D
 
Last edited:
cruising through pornhub now youtube (cams white label)haha
You can run but you cannot easily hide on the internet (from me anyway:p)
>>>

debug3: channel 36: status: The following connections are open:
#2 direct-tcpip: listening port 6769 for ads.trafficjunky.net port 443, connect from ::1 port 45738 to ::1 port 6769 (t4 r8 i0/0 o3/0 fd 6/6 cc -1)
#3 dynamic-tcpip (t13 nr0 i0/0 o0/0 fd 7/7 cc -1)
#4 direct-tcpip: listening port 6769 for www.google-analytics.com port 443, connect from ::1 port 45704 to ::1 port 6769 (t4 r3 i0/0 o0/0 fd 8/8 cc -1)
#5 direct-tcpip: listening port 6769 for search.spotxchange.com port 443, connect from ::1 port 45628 to ::1 port 6769 (t4 r12 i0/0 o0/0 fd 9/9 cc -1)
#6 direct-tcpip: listening port 6769 for chaturbate.com port 443, connect from ::1 port 45630 to ::1 port 6769 (t4 r0 i0/0 o0/0 fd 10/10 cc -1)
#7 direct-tcpip: listening port 6769 for public.chaturbate.com port 443, connect from ::1 port 45632 to ::1 port 6769 (t4 r2 i0/0 o0/0 fd 11/11 cc -1)
#8 direct-tcpip: listening port 6769 for news.google.com port 443, connect from ::1 port 45660 to ::1 port 6769 (t4 r1 i0/0 o0/0 fd 12/12 cc

#2 direct-tcpip: listening port 6769 for ads.trafficjunky.net port 443, connect from ::1 port 45738 to ::1 port 6769 (t4 r8 i3/0 o3/0 fd 6/6 cc -1)
#3 dynamic-tcpip (t13 nr0 i0/0 o0/0 fd 7/7 cc -1)
#4 direct-tcpip: listening port 6769 for www.google-analytics.com port 443, connect from ::1 port 45704 to ::1 port 6769 (t4 r3 i0/0 o0/0 fd 8/8 cc -1)
#5 direct-tcpip: listening port 6769 for search.spotxchange.com port 443, connect from ::1 port 45628 to ::1 port 6769 (t4 r12 i0/0 o0/0 fd 9/9 cc -1)
#6 direct-tcpip: listening port 6769 for chaturbate.com port 443, connect from ::1 port 45630 to ::1 port 6769 (t4 r0 i0/0 o0/0 fd 10/10 cc -1)
#7 direct-tcpip: listening port 6769 for public.chaturbate.com port 443, connect from ::1 port 45632 to ::1 port 6769 (t4 r2 i0/0 o0/0 fd 11/11 cc -1)
#8 direct-tcpip: listening port 6769 for news.google.com port 443, connect from ::1 port 45660 to ::1 port 6769 (t4 r1 i0/0 o0/0 fd 12/12 cc
debug2: channel 3: pre_dynamic: have 0

#3 dynamic-tcpip (t13 nr0 i0/0 o0/0 fd 7/7 cc -1)
#4 direct-tcpip: listening port 6769 for www.google-analytics.com port 443, connect from ::1 port 45704 to ::1 port 6769 (t4 r3 i0/0 o0/0 fd 8/8 cc -1)
#5 direct-tcpip: listening port 6769 for search.spotxchange.com port 443, connect from ::1 port 45628 to ::1 port 6769 (t4 r12 i0/0 o0/0 fd 9/9 cc -1)
#6 direct-tcpip: listening port 6769 for chaturbate.com port 443, connect from ::1 port 45630 to ::1 port 6769 (t4 r0 i0/0 o0/0 fd 10/10 cc -1)
#7 direct-tcpip: listening port 6769 for public.chaturbate.com port 443, connect from ::1 port 45632 to ::1 port 6769 (t4 r2 i0/0 o0/0 fd 11/11 cc -1)
#8 direct-tcpip: listening port 6769 for news.google.com port 443, connect from ::1 port 45660 to ::1 port 6769 (t4 r1 i0/0 o0/0 fd 12/12 cc -1)
#9 direct-tcpip: listening port 6769 for roomlister.stream.highwebmedia.com port 443, connect from ::1 port 45666 to ::1 port 6769 (t4 r4 i0/0

#4 direct-tcpip: listening port 6769 for www.google-analytics.com port 443, connect from ::1 port 45704 to ::1 port 6769 (t4 r3 i0/0 o0/0 fd 8/8 cc -1)
#5 direct-tcpip: listening port 6769 for search.spotxchange.com port 443, connect from ::1 port 45628 to ::1 port 6769 (t4 r12 i0/0 o0/0 fd 9/9 cc -1)
#6 direct-tcpip: listening port 6769 for chaturbate.com port 443, connect from ::1 port 45630 to ::1 port 6769 (t4 r0 i0/0 o0/0 fd 10/10 cc -1)
#7 direct-tcpip: listening port 6769 for public.chaturbate.com port 443, connect from ::1 port 45632 to ::1 port 6769 (t4 r2 i0/0 o0/0 fd 11/11 cc -1)
#8 direct-tcpip: listening port 6769 for news.google.com port 443, connect from ::1 port 45660 to ::1 port 6769 (t4 r1 i0/0 o0/0 fd 12/12 cc -1)
#9 direct-tcpip: listening port 6769 for roomlister.stream.highwebmedia.com port 443, connect from ::1 port 45666 to ::1 port 6769 (t4 r4 i0/0
debug2: channel 18: is dead
debug2: channel 18: garbage collecting
debug1: channel 18: free: direct-tcpip: listening port 6769 for etahub.com port 443, connect from ::1 port 45744 to ::1 port 6769, nchannels 19
debug3: channel 18: status: The following connections are open:
#3 dynamic-tcpip (t13 nr0 i0/0 o0/0 fd 7/7 cc -1)
#4 direct-tcpip: listening port 6769 for www.google-analytics.com port 443, connect from ::1 port 45704 to ::1 port 6769 (t4 r3 i0/0 o0/0 fd 8/8 cc -1)
#5 direct-tcpip: listening port 6769 for search.spotxchange.com port 443, connect from ::1 port 45628 to ::1 port 6769 (t4 r12 i0/0 o0/0 fd 9/9 cc -1)
#6 direct-tcpip: listening port 6769 for chaturbate.com port 443, connect from ::1 port 45630 to ::1 port 6769 (t4 r0 i0/0 o0/0 fd 10/10 cc -1)
#7 direct-tcpip: listening port 6769 for public.chaturbate.com port 443, connect from ::1 port 45632 to ::1 port 6769 (t4 r2 i0/0 o0/0 fd 11/11 cc -1)
#8 direct-tcpip: listening port 6769 for news.google.com port 443, connect from ::1 port 45660 to ::1 port 6769 (t4 r1 i0/0 o0/0 fd 12/12 cc -1)
#9 direct-tcpip: listening port 6769 for roomlister.stream.highwebmedia.com port 443, connect from ::1 port 45666 to ::1 port 6769 (t4 r4 i0/0

#4 direct-tcpip: listening port 6769 for www.google-analytics.com port 443, connect from ::1 port 45704 to ::1 port 6769 (t4 r3 i3/0 o3/0 fd 8/8 cc -1)
#5 direct-tcpip: listening port 6769 for search.spotxchange.com port 443, connect from ::1 port 45628 to ::1 port 6769 (t4 r12 i0/0 o0/0 fd 9/9 cc -1)
#6 direct-tcpip: listening port 6769 for chaturbate.com port 443, connect from ::1 port 45630 to ::1 port 6769 (t4 r0 i0/0 o0/0 fd 10/10 cc -1)
#7 direct-tcpip: listening port 6769 for public.chaturbate.com port 443, connect from ::1 port 45632 to ::1 port 6769 (t4 r2 i0/0 o0/0 fd 11/11 cc -1)
#8 direct-tcpip: listening port 6769 for news.google.com port 443, connect from ::1 port 45660 to ::1 port 6769 (t4 r1 i0/0 o0/0 fd 12/12 cc -1)
#9 direct-tcpip: listening port 6769 for roomlister.stream.highwebmedia.com port 443, connect from ::1 port 45666 to ::1 port 6769 (t4 r4 i0/0 o
debug2: channel 3: pre_dynamic: have 0


<<<

no problems clicking ads and viewing as a proxy :p

Sorry if anyone paid for my click and is pissed because it didn't convert -- at least you know why :D
 
slicing through Taboola ads this morning -- rape and pillage -- no problem with this proxy :eek:

>>>
debug2: channel 25: garbage collecting
debug1: channel 25: free: direct-tcpip: listening port 6769 for mailonline-us-d.openx.net port 443, connect from ::1 port 52468 to ::1 port 6769, nchannels 21
debug3: channel 25: status: The following connections are open:
#2 direct-tcpip: listening port 6769 for fonts.gstatic.com port 443, connect from ::1 port 52678 to ::1 port 6769 (t4 r0 i0/0 o0/0 fd 6/6 cc -1)
#3 dynamic-tcpip (t13 nr0 i0/0 o0/0 fd 7/7 cc -1)
#4 direct-tcpip: listening port 6769 for www.google-analytics.com port 443, connect from ::1 port 52682 to ::1 port 6769 (t4 r1 i0/0 o0/0 fd 8/8 cc -1)
#5 direct-tcpip: listening port 6769 for wf.taboola.com port 443, connect from ::1 port 52684 to ::1 port 6769 (t4 r2 i0/0 o0/0 fd 9/9 cc -1)
#6 direct-tcpip: listening port 6769 for trc.taboola.com port 443, connect from ::1 port 52686 to ::1 port 6769 (t4 r3 i0/0 o0/0 fd 10/10 cc -1)
#7 direct-tcpip: listening port 6769 for px.moatads.com port 443, connect from ::1 port 52688 to ::1 port 6769 (t4 r4 i0/0 o0/0 fd 11/11 cc -1)
#8 direct-tcpip: listening port 6769 for convlatbmp.taboola.com port 443, connect from ::1 port 52694 to ::1 port 6769 (t4 r5 i0/0 o0/0 fd 12/12 cc -1)
#9

<<<

this is 10 -40 % of what you are paying for
WTF
 
In case your are wondering here's a screenshot from a proxy/VPN leak detector
myproxy45xxxx184.jpg


BULLETPROOF
 
banners
Back