some minor improvements \\ enough work for today

This commit is contained in:
2024-02-14 00:02:35 +01:00
parent 512ef3b357
commit 9ca119e4df
14 changed files with 233 additions and 119 deletions

View File

@@ -6,15 +6,17 @@
# DNS Settings
# hijack_ip = the ip address that the dns server sends out as the A record, make this your JellyCAT Host
# hijack_app = the main domain we want to use to hijack, we use this domain to intercept DNS
# hijack_img = the domain we intercept for the imaging (branding) of the app we want to hijack (this function is currently removed)
# forward_ip = the ip address of an dns server we want to forward uninteresting DNS requests to
# hijack_ip = the ip address that the dns server sends out as the A record, make this your JellyCAT Host
# hijack_app = the main domain we want to use to hijack, we use this domain to intercept DNS
# hijack_img = the domain we intercept for the imaging (branding) of the app we want to hijack (this function is currently removed)
# forward_ip = the ip address of an dns server we want to forward uninteresting DNS requests to
# forward_port = the port of an dns server we want to forward uninteresting DNS requests to
hijack_ip = "192.168.11.23"
hijack_app = "atv.qello.com."
hijack_img = "notused.com."
forward_ip = "1.1.1.1"
hijack_ip = "192.168.11.23"
hijack_app = "atv.qello.com."
hijack_img = "notused.com."
forward_ip = "1.1.1.1"
forward_port = "53"
# WEBServer Settings
@@ -22,7 +24,7 @@ forward_ip = "1.1.1.1"
# http_port = the port you want to open for the http webserver (edit for use with reverse proxy)
https_port = ":443"
http_port = ":80"
http_port = ":80"
# CERTGEN Settings