Setting up shadowsocks-go on a vps with v2ray obfuscation.

Setting up shadowsocks-go on a vps with v2ray obfuscation.

DEAL Carding Club.

WARNING: This guide is not suitable for low-end VPS's and VPS's with OpenVZ virtualization. All of the commands are run by root user.

Installing shadowsocks-go

The latest ss-go release can be found on their github page: https://github.com/shadowsocks/go-shadowsocks2/releases.

updating apt

apt update && apt upgrade -y

creating a directory for binaries

mkdir /etc/ss-go && cd /etc/ss-go

download ss-go binary from github

wget https://github.com/shadowsocks/go-shadowsocks2/releases/download/v0.1.3/shadowsocks2-linux.gz

unpack it

gzip -d shadowsocks2-linux.gz

rename it so it's easy to work with

mv /etc/ss-go/shadowsocks2-linux /etc/ss-go/ss-go

make it executable

chmod +x /etc/ss-go/ss-go

give ss-go enough rights to take up needed ports

setcap “cap_net_bind_service=+eip” /etc/ss-go/ss-go

Installing v2ray-plugin

Again, the latest release should be on their github page. Choose the one appropriate for your architecture.

download the plugin

wget https://github.com/shadowsocks/v2ray-plugin/releases/download/v1.0/v2ray-plugin-linux-amd64-8cea1a3.tar.gz

unpack it

tar -xf v2ray-plugin-linux-amd64-8cea1a3.tar.gz

move and rename it

mv v2ray-plugin_linux_amd64 /etc/ss-go/ss-go/v2ray-plugin

give v2ray-plugin access to priviliged ports

setcap 'cap_net_bind_service=+eip' /etc/ss-go/ss-go/v2ray-plugin

make a systemd service

nano /etc/systemd/system/ss-go.service

Just copy that to the file above:

[Unit]

Description=simple-obfuscation standalone server service

Documentation=Shadowsocks-go with V2Ray Websocket obfuscation

After=network.target

[Service]

Type=simple

User=nobody

Group=nogroup

CapabilityBoundingSet=CAP_NET_BIND_SERVICE

AmbientCapabilities=CAP_NET_BIND_SERVICE

LimitNOFILE=51200

ExecStart=/etc/ss-go/ss-go -s 0.0.0.0:12345 -password ВАШ_ПАРОЛЬ -cipher AEAD_CHACHA20_POLY1305 -udp

[Install]

WantedBy=multi-user.target

Look at the bold text — here, after -s , you need to insert your VPS's IP, or home ip (127.0.0.1) or 0.0.0.0 and port — in the latter case shadowsocks will be available как through localhost AND through direct client connection. (e.g. if you need UDP traffic).

Reload the systemd units, launch ss-go service, enable it to load automaticly and check the status:

systemctl daemon-reload && systemctl restart ss-go.service && systemctl enable ss-go.service && systemctl status ss-go.service

Congrats, if everything went right, your system's traffic is routed through VPS and obfuscated using V2Ray.

IMPORTANT LINKS:

OUR CHANNEL - CLICK HERE

OUR CHAT - CLICK HERE

REVIEWS ABOUT WORKING WITH US - CLICK HERE


PREVIOUS ARTICLES:

Work Safely: How to stop leaving pieces of evidence at your hard drives.

Carding Amazon and other shops with American Express CC's

Drops: How to find them and work with them.


Report Page