.\" Text automatically generated by txt2man .TH tpserv 8 "05 October 2022" "tpserv-0.5" "General Use Manual" .SH NAME \fBtpserv \fP- program that implements a proxy \fB .SH SYNOPSIS .nf .fam C \fBtpserv\fP [\fB-V\fP] [\fB-v\fP] [\fB-h\fP] [\fB-D\fP] [\fB-c\fP] [\fB-p\fP \fIport\fP] .fam T .fi .fam T .fi .SH DESCRIPTION \fBtpserv\fP is a program that implements a proxy, a attack or whatever you want to call it. .PP It just listens on DST_PORT_PROXY that is configurable with \fB-p\fP option and receives the reassembled data stream from kernel. .PP Currently this program supports a mode in which echoes everything back to the src host or the mode in that it connects to destination to which the client wanted to connect and relay everything from client to that destination and everything from destination to the client. See the limitations on how the connection will look like on destination host. .PP It is possible to insert some code to this program to modify data from/to source/destination (but this you will have to do yourself). .SH OPTIONS .TP .B \fB-h\fP Show help message and exit. .TP .B \fB-V\fP Print version. .TP .B \fB-v\fP Verbose mode (prints connections). .TP .B \fB-vv\fP Even more verbose (prints connections and received/send packets). .TP .B \fB-D\fP Daemon mode. .TP .B \fB-c\fP Connection mode (default is echo mode). .TP .B \fB-p\fP [\fIport\fP] Set DST_PORT_PROXY listen. .SH EXAMPLES HOW IT WORKS TOGETHER - HUNT/TRANSPROXY/TPSERV .PP .nf .fam C Here is small example how to use together hunt, transproxy and tpserv. 1. At the beginning run tpsetup/transproxy program. The default destination port is 7000 and redirecting port is 7044. 2. Run tpserv/tpserv -v (or -vv). 3. Run hunt and enter arp spoof daemon menu. Do not start the daemon unless you modify the tpsetup/transproxy script "i" insert the single arp spoof in this order: - IP address (name) of your gateway or IP address (name) of destination host if the host is in the same IP subnet as source host. - as fake mac address enter 'my' or enter your interface MAC address. - enter IP address (name) of source host (client) from which you want to receive data - connections. - optionally enter refresh interval "t" test if the spoof was successful. 4. from the source host try to run telnet 1.1.1.1 7000 (or telnet destination_name 7000) and type some chars. The chars should be echoed back by tpserv program. You can then play little bit with DST_PORT setting in setup/transproxy script and/or -c option of tpserv program or change tpserv to modify data going from/to source/destination. .fam T .fi .SH SEE ALSO \fBhunt\fP(8), \fBtransproxy\fP(8) .SH AUTHOR \fBtpserv\fP was written by Pavel Krauz . .PP This manual page was written by Braulio Henrique Marques Souto for the Debian project (but may be used by others).