HPI Opener (Http Injector for PC)



Tagalog tutorial on How to Open Locked HPI Config in Http Injector for PC


Tools Needed:
  • RawCap.exe
  • (optional) notepad ++
  • HPI File
  • Target config
  • Administrator access
  • First open RawCap and HPI

Download Injector .HPI Unlocker Here

in raw cap kaylangan natin pumili ng interface. Yan yung adapter kung san ka nakaconect.
Para mas madale hanapin mo yung IPv4 ng modem or wifi mo. In my case 192.168.8.100.
Ok kung di mo pa din alam, go to control panel>network and sharing under "view your active networks">"connections" double click mo yung Wireless network kung naka wifi ka.
then, click details, here you can see the IPv4 take note of that.

Let's go back

type and enter the number that corresponds to your connection in my case 3

Example 1
HPI Opener


Then type and enter [whatever].pcap. For the sake of this tutorial I used example.pcap

Go to your HPI make sure na check ang tunnel at log.
Go to Bitvise / Plink log tab para makita mo ang IP ng ssh ng target mo. Magagamit mo to para madaling hanapin mamaya ang payload.
then Click start.. take note of the IP, better copy it...
Next Hintayin mo lang na kumonek o mag error...

Kung kumonek (mangyayare yun kung di pa expired), surf surf ka muna. Check mo kung ilan na nacacapture na packets sa RawCap i recommend more than a thousand before stopping.

Kung di kumonek, stop-start nyo lang hanggang sa dumami ng dumami ang packets sa RawCap.

Kung Ok na. Go back to RawCap and press CTRL+C.
Head over to the location of your RawCap (e.g. Desktop) and find the [whatever].pcap file and open it using a text editor (I'll be using notepad ++)
Hit CTRL+F and paste mo yung IP na kinopy natin kanina then hit enter.
Hanap ka ng medyo malinaw. Eto resulta ng aking example


Example2

HPI Opener

Next step ay itranslate ito..
Kung my alam ka na sa payload pwede ka na mag skip kasi alam mo na ang mga susunod.
Sa example makikita na ang request method ay CONNECT at normal ang injection. makikita rin na may roong X-Online-Host, X-Forward-Host, User-Agent, at Keep-Alive na nag mamatch doon sa first picture.
Ibig sabihin kung gagamit ng generator request:connect injection:normal at ichecheck ang X-Online-Host, X-Forward-Host, User-Agent, at Keep-Alive. At syempre ika copy paste natin yung host (sa example pagead2.googlesyndication.com).

Tip: 1enter=1[crlf]
Connect xxx.xxx.xxx.xxx:xxx HTTP/1.1=CONNECT [host_port][protocol]
Example:
CONNECT xxx.xxx.xxx.xxx:xxx HTTP/1.1
Host: pogiako.com
X-Online-Host: pogiako.com

CONNECT xxx.xxx.xxx.xxx:xxx HTTP/1.1

equivalent to...

CONNECT [host_port][protocol][crlf]Host: pogiako.com[crlf]X-Online-Host: pogiako.com[crlf][crlf]CONNECT [host_port][protocol]
Share on Google Plus

About infotechmaestro

A tech blog to feed every readers mind to know about the latest gadgets, games, what's trending and provide how to tutorials. Connect wih us on Facebook, Twitter, GooglePlus.
    Blogger Comment
    Facebook Comment

0 comments:

Post a Comment