Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add full WebSocket impersonation #187

Open
lwthiker opened this issue Sep 18, 2023 · 1 comment
Open

Add full WebSocket impersonation #187

lwthiker opened this issue Sep 18, 2023 · 1 comment
Labels
enhancement New feature or request

Comments

@lwthiker
Copy link
Owner

Chrome's TLS fingerprint when connecting to a websocket is different than its usual fingerprint (for example, the ALPN tls extension only advertises http/1.1 as a supported protocol). To fully impersonate Chrome on a websocket connection, we need to modify the TLS fingerprint and some HTTP headers.

Currently I'm not aware of any websocket server blocking connections based on fingerprint, so this is on a bit of lower priority.

@mmmray
Copy link

mmmray commented Apr 8, 2024

+1 on this. currently no ALPN is advertised at all, and CURLOPT_HTTP_VERSION does not help

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants