From 8e32477074ce8b93bd7f76d5cf88aea8d671a135 Mon Sep 17 00:00:00 2001
From: skyper <5938498+SkyperTHC@users.noreply.github.com>
Date: Tue, 10 Oct 2023 09:43:15 +0100
Subject: [PATCH] Update README.md
---
README.md | 21 ++++++++++++---------
1 file changed, 12 insertions(+), 9 deletions(-)
diff --git a/README.md b/README.md
index 00457ca..275528e 100644
--- a/README.md
+++ b/README.md
@@ -470,9 +470,9 @@ Other free services are limited to forward HTTPS only (not raw TCP). Some tricks
**3.iii.b HTTPS reverse tunnels**
-On the server:
+On the server, use any one of these three tunneling services:
```sh
-### Reverse HTTPS tunnel to forward public HTTPS requests to Port 8080 on this server:
+### Reverse HTTPS tunnel to forward public HTTPS requests to this server's port 8080:
ssh -R80:0:8080 -o StrictHostKeyChecking=accept-new nokey@localhost.run
### Or using remote.moe
ssh -R80:0:8080 -o StrictHostKeyChecking=accept-new nokey@remote.moe
@@ -481,29 +481,32 @@ curl -fL -o cloudflared https://github.com/cloudflare/cloudflared/releases/lates
chmod 755 cloudflared
cloudflared tunnel --url http://localhost:8080 --no-autoupdate
```
-Either tunnel will generate a new HTTPS-URL for you. Use this URL on your workstation (see below). Use [Gost](https://iq.thc.org/tunnel-via-cloudflare-to-any-tcp-service) to tunnel raw TCP over the HTTP(s) link.
+Either service will generate a new temporary HTTPS-URL for you to use. Optionally, use [Gost](https://iq.thc.org/tunnel-via-cloudflare-to-any-tcp-service) on both ends to tunnel raw TCP over the HTTPS URL.
-A simple STDIN/STDOUT pipe via HTTPS:
+A. A simple STDIN/STDOUT pipe via HTTPS:
```sh
+### On the server convert WebSocket to raw TCP:
websocat -s 8080
-### and on the workstation use this command to connect:
+```
+```sh
+### On the remote target forward stdin/stdout to WebSocket:
websocat wss://
```
-Or run a Socks-Proxy (via HTTPS):
+B. Forward raw TCP via HTTPS:
```sh
### On the server
gost -L mws://:8080
```
-On the workstation:
-
Forward port 2222 to the server's port 22.
```sh
+### On the workstation:
gost -L tcp://:2222/127.0.0.1:22 -F 'mwss://:443'
```
-or use it as a Socks-Proxy:
+or use the server as an Socks-Proxy EXIT node (from the workstation, via the HTTPS reverse tunnel):
```sh
+### On the workstation:
gost -L :1080 -F 'mwss://:443'
### Test the Socks-proxy:
curl -x socks5h://0 ipinfo.io