shadowtunnel是一款可以在你本地机器和远程服务之间建立安全的加密隧道,保护你的tcp流量,能高效压缩传输,流量无特征。
localmachine<---->shadowtunnel<--->serviceonremote.
用法Usage of ./shadowtunnel: -E outbound connection is encrypted -c compress traffic (default true) -e inbound connection is encrypted -f string forward address,such as : 127.0.0.1:8080 -l string local listen address, such as : 0.0.0.0:33000 (default ":50000") -m string method of encrypt/decrypt, these below are supported : aes-192-ctr,aes-256-ctr,cast5-cfb,chacha20,aes-128-cfb,aes-192-cfb, rc4-md5,rc4-md5-6,chacha20-ietf,aes-128-ctr,bf-cfb,aes-256-cfb,des-cfb (default "aes-192-cfb") -p string password of encrypt/decrypt (default "shadowtunnel") -t int connection timeout seconds (default 3) -v show version示例1.http代理
假设有一个vps,它的IP是 2.2.2.2
首先在2.2.2.2启动一个http代理然后下载http代理程序,使用root权限在vps上执行下面的命令:
wgethttps://github.com/snail007/goproxy/releases/download/v4.9/proxy-linux-amd64.tar.gz&&tarzxfvproxy-linux-amd64.tar.gz&&rmproxy-linux-amd64.tar.gz&&mvproxy/usr/bin/&&proxyhttp-p127.0.0.1:38080&
2.在vps启动一个隧道
下载shadowtunnel程序,使用root权限在vps上执行下面的命令:
wgethttps://github.com/snail007/shadowtunnel/releases/download/v1.0/shadowtunnel-linux-amd64.tar.gz&&tarzxfvshadowtunnel-linux-amd64.tar.gz&&rmshadowtunnel-linux-amd64.tar.gz&&mvshadowtunnel/usr/bin/
在vps上监听:50000并转发到 127.0.0.1:38080:
shadowtunnel-e-f127.0.0.1:38080-l:50000
3.在本地机器上启动一个隧道
在本地机器上监听:50000并转发到 2.2.2.2:50000:
shadowtunnel-E-f2.2.2.2:50000-l:50000
4.在chrome中设置http代理配置
设置本地chrome的http代理配置如下:
ip:127.0.0.1port:50000
5.完成
评论