Updated links
This commit is contained in:
@@ -1,5 +1,5 @@
|
||||
# hostscan-bypass
|
||||
Generate an OpenConnect [Cisco Secure Desktop](http://www.infradead.org/openconnect/csd.html)(CSD) file that bypasses AnyConnect hostscan requirements.
|
||||
Generate an OpenConnect Cisco Secure Desktop [(CSD)](http://www.infradead.org/openconnect/csd.html) file that bypasses AnyConnect hostscan requirements.
|
||||
|
||||
This script parses an AnyConnect client connection and outputs a CSD file that can be used with OpenConnect. The CSD file will perform a POST request to the AnyConnect server, giving the illusion a hostscan took place. Even if the AnyConnect server does not publish binaries for your Operating System (OS), you will still be able to connect. This is due to the fact that OpenConnect allows you to specify which OS you are connecting from. This means you can be on a Linux and pretend to be a Windows client!
|
||||
|
||||
@@ -16,6 +16,6 @@ WARNING: Doing this will bypass the checks hostscan performs. This may be agains
|
||||
5. Finally, connect: `sudo openconnect --csd-wrapper=hostscan-bypass.sh <VPN URL> --os=win`
|
||||
|
||||
# Shout Outs
|
||||
1. `hostscan-bypass.go` was hacked off of [tcpprox](https://github.com/staaldraad/tcpprox). Thanks @staaldraad!
|
||||
1. `hostscan-bypass.go` was hacked off of [tcpprox](https://github.com/staaldraad/tcpprox). Thanks [@staaldraad](https://github.com/staaldraad)!
|
||||
2. Fromzy, who happened to posted the most [simple CSD](http://lists.infradead.org/pipermail/openconnect-devel/2015-January/002544.html) example
|
||||
3. @bmaddy, who [posted examples](https://gist.github.com/bmaddy/dc720f494fa4de28ffc03cc6a472e965) and resources that aided in the completion of this project
|
||||
3. [@bmaddy](https://gist.github.com/bmaddy), who [posted examples](https://gist.github.com/bmaddy/dc720f494fa4de28ffc03cc6a472e965) and resources that aided in the completion of this project
|
||||
|
||||
Reference in New Issue
Block a user