F
F
fastboot2021-04-10 21:05:33
Android
fastboot, 2021-04-10 21:05:33

VPN obfuscator + Android client what and how?

What can be found to bypass blocking?
It turns out that almost everything is blocked by Wi-Fi and all traffic passes the filter with the substitution of SSL certificates for someone else's. 80, 8080, 443 ports for connection are available, the rest are blocked + VPN traffic is still visible which is blocked.

Now I saw a new word Obfuscator
It turns out that on my side an OpenVPN server is running on pfSense 2.4.3
+ ad blocking on the Malinka DNS server

[email protected]:~# uname -a
Linux ZeroPi-DNS 4.14.111 #1 SMP Thu Dec 19 15:23:22 CST 2019 armv7l armv7l armv7l GNU/Linux

architecture
[email protected]:~# arch
armv7l

on this piece of iron I want to make a server for traffic obfuscation.
[email protected]:~# apt search Obfsproxy
Сортировка… Готово
Полнотекстовый поиск… Готово
obfsproxy/xenial 0.2.13-1 all
  pluggable transport proxy for Tor

[email protected]:~#


or on Windows Server 2019 24/7
6071e8b770927633870858.png

On Android, I want to connect to my VPN server.

Please guide me what should I do?

Answer the question

In order to leave comments, you need to log in

1 answer(s)
C
CityCat4, 2021-04-12
@CityCat4

Well, firstly, the "code obfuscation" tag has nothing to do with the word at all.
And secondly, since you have learned the fashionable word obfuscator, I recommend the no less fashionable shadowsocks :) It was made by the Chinese - great entertainers in bypassing blocking :)

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question