read 517 bytes from C:\Users\ads\Desktop\YTDisBystroold\fake\tls_clienthello_4.bin read 1357 bytes from C:\Users\ads\Desktop\YTDisBystroold\fake\quic_3.bin read 652 bytes from C:\Users\ads\Desktop\YTDisBystroold\fake\tls_clienthello_2.bin read 517 bytes from C:\Users\ads\Desktop\YTDisBystroold\fake\tls_clienthello_4.bin read 517 bytes from C:\Users\ads\Desktop\YTDisBystroold\fake\tls_clienthello_3.bin read 4 bytes from hex string read 136 bytes from C:\Users\ads\Desktop\YTDisBystroold\fake\quic_2.bin read 517 bytes from C:\Users\ads\Desktop\YTDisBystroold\fake\tls_clienthello_4.bin windivert filter size: 1688 windivert filter: !impostor and !loopback and ((outbound and (!tcp or tcp.Syn or tcp.PayloadLength>0) and (((tcp.DstPort == 80) or (tcp.DstPort == 443)) or ((udp.DstPort == 443) or (udp.DstPort >= 50000 and udp.DstPort <= 50090))) and (((ip.DstAddr < 127.0.0.1 or ip.DstAddr > 127.255.255.255) and (ip.DstAddr < 10.0.0.0 or ip.DstAddr > 10.255.255.255) and (ip.DstAddr < 192.168.0.0 or ip.DstAddr > 192.168.255.255) and (ip.DstAddr < 172.16.0.0 or ip.DstAddr > 172.31.255.255) and (ip.DstAddr < 169.254.0.0 or ip.DstAddr > 169.254.255.255)) or ((ipv6.DstAddr > ::1) and (ipv6.DstAddr < 2001::0 or ipv6.DstAddr >= 2001:1::0) and (ipv6.DstAddr < fc00::0 or ipv6.DstAddr >= fe00::0) and (ipv6.DstAddr < fe80::0 or ipv6.DstAddr >= fec0::0) and (ipv6.DstAddr < ff00::0 or ipv6.DstAddr >= ffff::0)))) or (inbound and tcp and ((tcp.Ack and tcp.Syn or tcp.Rst or tcp.Fin) or (tcp.PayloadLength>=12 and tcp.Payload32[0]==0x48545450 and tcp.Payload16[2]==0x2F31 and tcp.Payload[6]==0x2E and tcp.Payload16[4]==0x2033 and tcp.Payload[10]==0x30 and (tcp.Payload[11]==0x32 or tcp.Payload[11]==0x37))) and ((tcp.SrcPort == 80) or (tcp.SrcPort == 443)) and (((ip.SrcAddr < 127.0.0.1 or ip.SrcAddr > 127.255.255.255) and (ip.SrcAddr < 10.0.0.0 or ip.SrcAddr > 10.255.255.255) and (ip.SrcAddr < 192.168.0.0 or ip.SrcAddr > 192.168.255.255) and (ip.SrcAddr < 172.16.0.0 or ip.SrcAddr > 172.31.255.255) and (ip.SrcAddr < 169.254.0.0 or ip.SrcAddr > 169.254.255.255)) or ((ipv6.SrcAddr > ::1) and (ipv6.SrcAddr < 2001::0 or ipv6.SrcAddr >= 2001:1::0) and (ipv6.SrcAddr < fc00::0 or ipv6.SrcAddr >= fe00::0) and (ipv6.SrcAddr < fe80::0 or ipv6.SrcAddr >= fec0::0) and (ipv6.SrcAddr < ff00::0 or ipv6.SrcAddr >= ffff::0))))) adding low-priority default empty desync profile we have 11 user defined desync profile(s) and default low priority profile 0 [profile 2] autottl ipv4 1:3-20 [profile 2] autottl ipv6 1:3-20 [profile 4] autottl ipv4 1:3-20 [profile 4] autottl ipv6 1:3-20 [profile 5] autottl ipv4 1:3-20 [profile 5] autottl ipv6 1:3-20 [profile 6] autottl ipv4 1:3-20 [profile 6] autottl ipv6 1:3-20 [profile 7] autottl ipv4 1:3-20 [profile 7] autottl ipv6 1:3-20 [profile 11] autottl ipv4 1:3-20 [profile 11] autottl ipv6 1:3-20 Loading hostlist C:\Users\ads\Desktop\YTDisBystroold\lists\autohostlist.txt loading plain text list Loaded 0 hosts from C:\Users\ads\Desktop\YTDisBystroold\lists\autohostlist.txt Loading hostlist C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord.txt loading plain text list Loaded 9 hosts from C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord.txt Loading hostlist C:\Users\ads\Desktop\YTDisBystroold\lists\myhostlist.txt loading plain text list Loaded 7 hosts from C:\Users\ads\Desktop\YTDisBystroold\lists\myhostlist.txt Loading hostlist C:\Users\ads\Desktop\YTDisBystroold\lists\russia-blacklist.txt loading plain text list Loaded 152163 hosts from C:\Users\ads\Desktop\YTDisBystroold\lists\russia-blacklist.txt Loading hostlist C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube.txt loading plain text list Loaded 22 hosts from C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube.txt Loading hostlist C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtubeQ.txt loading plain text list Loaded 12 hosts from C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtubeQ.txt Loading hostlist C:\Users\ads\Desktop\YTDisBystroold\lists\netrogat.txt loading plain text list Loaded 4 hosts from C:\Users\ads\Desktop\YTDisBystroold\lists\netrogat.txt Loading ipset C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt loading plain text list Loaded 722 ip/subnets from C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt Loading ipset C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt loading plain text list Loaded 20 ip/subnets from C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt lists summary: hostlist file C:\Users\ads\Desktop\YTDisBystroold\lists\autohostlist.txt hostlist file C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord.txt hostlist file C:\Users\ads\Desktop\YTDisBystroold\lists\myhostlist.txt hostlist file C:\Users\ads\Desktop\YTDisBystroold\lists\russia-blacklist.txt hostlist file C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube.txt hostlist file C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtubeQ.txt hostlist file C:\Users\ads\Desktop\YTDisBystroold\lists\netrogat.txt profile 1 include hostlist C:\Users\ads\Desktop\YTDisBystroold\lists\netrogat.txt profile 3 include hostlist C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtubeQ.txt profile 4 include hostlist C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube.txt profile 5 include hostlist C:\Users\ads\Desktop\YTDisBystroold\lists\myhostlist.txt profile 5 include hostlist C:\Users\ads\Desktop\YTDisBystroold\lists\russia-blacklist.txt profile 6 include hostlist C:\Users\ads\Desktop\YTDisBystroold\lists\myhostlist.txt profile 6 include hostlist C:\Users\ads\Desktop\YTDisBystroold\lists\russia-blacklist.txt profile 8 include hostlist C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord.txt profile 11 exclude hostlist C:\Users\ads\Desktop\YTDisBystroold\lists\netrogat.txt profile 11 auto hostlist C:\Users\ads\Desktop\YTDisBystroold\lists\autohostlist.txt ipset file C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt (ipv4) ipset file C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt (ipv4) profile 2 include ipset C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt (ipv4) profile 7 include ipset C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt (ipv4) splits summary: profile 1 multisplit abs 2 profile 2 multisplit abs 2 profile 3 multisplit abs 2 profile 4 multisplit abs 2 profile 4 seqovl abs 2 profile 5 multisplit abs 2 profile 6 multisplit midsld -1 profile 6 seqovl abs 1 profile 7 multisplit abs 2 profile 8 multisplit abs 2 profile 9 multisplit abs 2 profile 10 multisplit midsld -1 profile 10 seqovl abs 1 profile 11 multisplit midsld 0 profile 11 multisplit abs 1 profile 11 seqovl abs 1 profile 0 multisplit abs 2 initializing conntrack with timeouts tcp=60:300:60 udp=60 windivert initialized. capture is started. packet: id=0 len=41 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 108.177.14.101 proto=tcp ttl=64 sport=51347 dport=443 flags=A seq=3558292428 ack_seq=1653185781 TCP: len=1 : 00 : . desync profile search for tcp target=108.177.14.101:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 108.177.14.101 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 108.177.14.101 : negative desync profile 10 matches not changing wssize. wssize is set but conntrack entry is missing not applying tampering to unknown protocol packet: id=0 reinject unmodified packet: id=1 len=41 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.162.94 proto=tcp ttl=64 sport=51348 dport=443 flags=A seq=492115060 ack_seq=3552374698 TCP: len=1 : 00 : . desync profile search for tcp target=64.233.162.94:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 64.233.162.94 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 64.233.162.94 : negative desync profile 10 matches not changing wssize. wssize is set but conntrack entry is missing not applying tampering to unknown protocol packet: id=1 reinject unmodified packet: id=2 len=41 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 34.107.221.82 proto=tcp ttl=64 sport=51361 dport=80 flags=A seq=1602401641 ack_seq=2961765197 TCP: len=1 : 00 : . desync profile search for tcp target=34.107.221.82:80 l7proto=unknown hostname='' desync profile 0 matches not applying tampering to unknown protocol packet: id=2 reinject unmodified packet: id=3 len=41 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 34.107.221.82 proto=tcp ttl=64 sport=51368 dport=80 flags=A seq=3571870220 ack_seq=3055136677 TCP: len=1 : 00 : . desync profile search for tcp target=34.107.221.82:80 l7proto=unknown hostname='' desync profile 0 matches not applying tampering to unknown protocol packet: id=3 reinject unmodified packet: id=4 len=41 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.198 proto=tcp ttl=64 sport=51349 dport=443 flags=A seq=1050139308 ack_seq=2866331557 TCP: len=1 : 00 : . desync profile search for tcp target=64.233.165.198:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 64.233.165.198 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 64.233.165.198 : negative desync profile 10 matches not changing wssize. wssize is set but conntrack entry is missing not applying tampering to unknown protocol packet: id=4 reinject unmodified packet: id=5 len=41 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.138 proto=tcp ttl=64 sport=51352 dport=443 flags=A seq=2922537994 ack_seq=2247934039 TCP: len=1 : 00 : . desync profile search for tcp target=74.125.131.138:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 74.125.131.138 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 74.125.131.138 : negative desync profile 10 matches not changing wssize. wssize is set but conntrack entry is missing not applying tampering to unknown protocol packet: id=5 reinject unmodified packet: id=6 len=41 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.221.94 proto=tcp ttl=64 sport=51355 dport=443 flags=A seq=3843134473 ack_seq=3534204796 TCP: len=1 : 00 : . desync profile search for tcp target=173.194.221.94:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 173.194.221.94 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 173.194.221.94 : negative desync profile 10 matches not changing wssize. wssize is set but conntrack entry is missing not applying tampering to unknown protocol packet: id=6 reinject unmodified packet: id=7 len=41 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.35 proto=tcp ttl=64 sport=51354 dport=443 flags=A seq=4042528050 ack_seq=2220953757 TCP: len=1 : 00 : . desync profile search for tcp target=142.250.74.35:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 142.250.74.35 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 142.250.74.35 : negative desync profile 10 matches not changing wssize. wssize is set but conntrack entry is missing not applying tampering to unknown protocol packet: id=7 reinject unmodified packet: id=8 len=41 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.221.132 proto=tcp ttl=64 sport=51353 dport=443 flags=A seq=3875032603 ack_seq=218368320 TCP: len=1 : 00 : . desync profile search for tcp target=173.194.221.132:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 173.194.221.132 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 173.194.221.132 : negative desync profile 10 matches not changing wssize. wssize is set but conntrack entry is missing not applying tampering to unknown protocol packet: id=8 reinject unmodified packet: id=9 len=41 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.42 proto=tcp ttl=64 sport=51356 dport=443 flags=A seq=730719775 ack_seq=3980507340 TCP: len=1 : 00 : . desync profile search for tcp target=142.250.74.42:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 142.250.74.42 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 142.250.74.42 : negative desync profile 10 matches not changing wssize. wssize is set but conntrack entry is missing not applying tampering to unknown protocol packet: id=9 reinject unmodified packet: id=10 len=41 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 34.107.221.82 proto=tcp ttl=64 sport=51361 dport=80 flags=A seq=1602401641 ack_seq=2961765197 TCP: len=1 : 00 : . desync profile search for tcp target=34.107.221.82:80 l7proto=unknown hostname='' desync profile 0 matches not applying tampering to unknown protocol packet: id=10 reinject unmodified packet: id=11 len=41 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 34.107.221.82 proto=tcp ttl=64 sport=51368 dport=80 flags=A seq=3571870220 ack_seq=3055136677 TCP: len=1 : 00 : . desync profile search for tcp target=34.107.221.82:80 l7proto=unknown hostname='' desync profile 0 matches not applying tampering to unknown protocol packet: id=11 reinject unmodified packet: id=12 len=41 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.94 proto=tcp ttl=64 sport=51386 dport=443 flags=A seq=1861331158 ack_seq=4286976887 TCP: len=1 : 00 : . desync profile search for tcp target=74.125.131.94:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 74.125.131.94 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 74.125.131.94 : negative desync profile 10 matches not changing wssize. wssize is set but conntrack entry is missing not applying tampering to unknown protocol packet: id=12 reinject unmodified packet: id=13 len=86 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 34.160.144.191 proto=tcp ttl=64 sport=51372 dport=443 flags=AP seq=1949283457 ack_seq=3767313244 TCP: len=46 : 17 03 03 00 29 00 00 00 00 00 00 00 04 7B 48 21 29 F7 2F 25 09 D3 D6 D9 AD BC 3F F7 96 CB 12 1A ... : ....)........{H!)./%......?..... ... desync profile search for tcp target=34.160.144.191:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 34.160.144.191 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 34.160.144.191 : negative desync profile 10 matches not changing wssize. wssize is set but conntrack entry is missing not applying tampering to unknown protocol packet: id=13 reinject unmodified packet: id=14 len=79 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 34.117.188.166 proto=tcp ttl=64 sport=51369 dport=443 flags=AP seq=4259656442 ack_seq=1301172334 TCP: len=39 : 17 03 03 00 22 46 3C 1B 9F 42 75 FB 5B 1C E8 F7 06 D6 97 0D 97 3E BF EB 2B 12 2D 73 52 81 B5 B5 ... : ...."F<..Bu.[........>..+.-sR... ... desync profile search for tcp target=34.117.188.166:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 34.117.188.166 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 34.117.188.166 : negative desync profile 10 matches not changing wssize. wssize is set but conntrack entry is missing not applying tampering to unknown protocol packet: id=14 reinject unmodified packet: id=15 len=79 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 34.149.100.209 proto=tcp ttl=64 sport=51374 dport=443 flags=AP seq=347889670 ack_seq=796730835 TCP: len=39 : 17 03 03 00 22 A4 FC D2 03 D6 E7 99 1A D0 B1 F4 28 C6 44 35 CE 59 C6 5C 5C B3 09 DE B4 3F E7 5A ... : ...."...........(.D5.Y.\\....?.Z ... desync profile search for tcp target=34.149.100.209:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 34.149.100.209 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 34.149.100.209 : negative desync profile 10 matches not changing wssize. wssize is set but conntrack entry is missing not applying tampering to unknown protocol packet: id=15 reinject unmodified packet: id=16 len=41 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 34.107.221.82 proto=tcp ttl=64 sport=51361 dport=80 flags=A seq=1602401641 ack_seq=2961765197 TCP: len=1 : 00 : . desync profile search for tcp target=34.107.221.82:80 l7proto=unknown hostname='' desync profile 0 matches not applying tampering to unknown protocol packet: id=16 reinject unmodified packet: id=17 len=41 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 34.107.221.82 proto=tcp ttl=64 sport=51368 dport=80 flags=A seq=3571870220 ack_seq=3055136677 TCP: len=1 : 00 : . desync profile search for tcp target=34.107.221.82:80 l7proto=unknown hostname='' desync profile 0 matches not applying tampering to unknown protocol packet: id=17 reinject unmodified packet: id=18 len=40 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 142.250.74.35 => 192.168.1.6 proto=tcp ttl=57 sport=443 dport=51354 flags=AF seq=2220953757 ack_seq=4042528052 desync profile search for tcp target=192.168.1.6:51354 l7proto=unknown hostname='' desync profile 0 matches packet: id=18 reinject unmodified packet: id=19 len=40 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 173.194.221.94 => 192.168.1.6 proto=tcp ttl=120 sport=443 dport=51355 flags=AF seq=3534204796 ack_seq=3843134475 desync profile search for tcp target=192.168.1.6:51355 l7proto=unknown hostname='' desync profile 0 matches packet: id=19 reinject unmodified packet: id=20 len=52 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.132 proto=tcp ttl=64 sport=51387 dport=443 flags=S seq=3028818468 ack_seq=0 desync profile search for tcp target=142.250.74.132:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 142.250.74.132 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 142.250.74.132 : negative desync profile 10 matches Window size change 64240 => 1 Scale factor change 8 => 6 packet: id=20 reinject modified len=52 packet: id=21 len=52 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 142.250.74.132 => 192.168.1.6 proto=tcp ttl=59 sport=443 dport=51387 flags=SA seq=3296908407 ack_seq=3028818469 using cached desync profile 10 incoming TTL 59 packet: id=21 reinject unmodified packet: id=22 len=1452 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.132 proto=tcp ttl=64 sport=51387 dport=443 flags=A seq=3028818469 ack_seq=3296908408 TCP: len=1412 : 16 03 01 08 9D 01 00 08 99 03 03 AD 02 E5 84 C6 F3 94 DD 33 60 9C 1D 98 C7 D5 E8 0F D4 2B 33 4F ... : ...................3`........+3O ... using cached desync profile 10 Window size change 1025 => 1 packet contains partial TLS ClientHello starting reassemble. now we have 1412/2210 req retrans : seq interval 3028818469-3028819880 DELAY desync until reasm is complete (#1) packet: id=22 drop packet: id=23 len=838 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.132 proto=tcp ttl=64 sport=51387 dport=443 flags=AP seq=3028819881 ack_seq=3296908408 TCP: len=798 : 36 E9 F4 47 DB 07 E2 13 3C 2E B5 43 EF AD B5 FA 08 B5 48 53 29 20 E4 8F E6 39 00 0B 00 02 01 00 ... : 6..G....<..C......HS) ...9...... ... using cached desync profile 10 Window size change 1025 => 1 reassemble : feeding data payload size=798. now we have 2210/2210 packet contains full TLS ClientHello req retrans : seq interval 3028818469-3028820678 forced wssize-cutoff DELAY desync until reasm is complete (#2) REPLAYING delayed packet #1 offset 0 REPLAY IP4: 192.168.1.6 => 142.250.74.132 proto=tcp ttl=64 sport=51387 dport=443 flags=A seq=3028818469 ack_seq=3296908408 TCP: len=1412 : 16 03 01 08 9D 01 00 08 99 03 03 AD 02 E5 84 C6 F3 94 DD 33 60 9C 1D 98 C7 D5 E8 0F D4 2B 33 4F ... : ...................3`........+3O ... using cached desync profile 10 packet contains full TLS ClientHello hostname: www.google.com discovered l7 protocol discovered hostname desync profile search for tcp target=142.250.74.132:443 l7proto=tls hostname='www.google.com' * hostlist check for profile 1 [C:\Users\ads\Desktop\YTDisBystroold\lists\netrogat.txt] include hostlist check for www.google.com : negative hostlist check for google.com : negative hostlist check for com : negative * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 142.250.74.132 : negative * hostlist check for profile 4 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube.txt] include hostlist check for www.google.com : negative hostlist check for google.com : negative hostlist check for com : negative * hostlist check for profile 6 [C:\Users\ads\Desktop\YTDisBystroold\lists\myhostlist.txt] include hostlist check for www.google.com : negative hostlist check for google.com : negative hostlist check for com : negative [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-blacklist.txt] include hostlist check for www.google.com : negative hostlist check for google.com : negative hostlist check for com : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 142.250.74.132 : negative desync profile 10 matches dpi desync src=192.168.1.6:51387 dst=142.250.74.132:443 regular split pos: 1508 regular split pos is outside of this packet seqovl : 1 SENDING delayed packet #1 unmodified REPLAYING delayed packet #2 offset 1412 REPLAY IP4: 192.168.1.6 => 142.250.74.132 proto=tcp ttl=64 sport=51387 dport=443 flags=AP seq=3028819881 ack_seq=3296908408 TCP: len=798 : 36 E9 F4 47 DB 07 E2 13 3C 2E B5 43 EF AD B5 FA 08 B5 48 53 29 20 E4 8F E6 39 00 0B 00 02 01 00 ... : 6..G....<..C......HS) ...9...... ... using cached desync profile 10 packet contains full TLS ClientHello hostname: www.google.com dpi desync src=192.168.1.6:51387 dst=142.250.74.132:443 regular split pos: 1508 normalized regular split pos : 96 seqovl : 1 sending fake(1) 1st tcp segment 0-95 len=96 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending 1st tcp segment 0-95 len=96 seqovl=1 : 00 36 E9 F4 47 DB 07 E2 13 3C 2E B5 43 EF AD B5 FA 08 B5 48 53 29 20 E4 8F E6 39 00 0B 00 02 01 ... : .6..G....<..C......HS) ...9..... ... sending fake(2) 1st tcp segment 0-95 len=96 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending fake(1) 2nd tcp segment 96-797 len=702 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending 2nd tcp segment 96-797 len=702 : 6F 67 6C 65 2E 63 6F 6D 44 69 00 05 00 03 02 68 32 00 12 00 00 FE 0D 00 DA 00 00 01 00 01 6E 00 ... : ogle.comDi.....h2.............n. ... sending fake(2) 2nd tcp segment 96-797 len=702 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... DROPPING delayed packet #2 reassemble session finished packet: id=23 drop packet: id=24 len=52 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.132 proto=tcp ttl=64 sport=51388 dport=443 flags=S seq=2222385244 ack_seq=0 desync profile search for tcp target=142.250.74.132:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 142.250.74.132 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 142.250.74.132 : negative desync profile 10 matches Window size change 64240 => 1 Scale factor change 8 => 6 packet: id=24 reinject modified len=52 packet: id=25 len=52 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.132 proto=tcp ttl=64 sport=51389 dport=443 flags=S seq=1404970259 ack_seq=0 desync profile search for tcp target=142.250.74.132:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 142.250.74.132 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 142.250.74.132 : negative desync profile 10 matches Window size change 64240 => 1 Scale factor change 8 => 6 packet: id=25 reinject modified len=52 packet: id=26 len=52 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 142.250.74.132 => 192.168.1.6 proto=tcp ttl=121 sport=443 dport=51388 flags=SA seq=2270335247 ack_seq=2222385245 using cached desync profile 10 incoming TTL 121 packet: id=26 reinject unmodified packet: id=27 len=1452 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.132 proto=tcp ttl=64 sport=51388 dport=443 flags=A seq=2222385245 ack_seq=2270335248 TCP: len=1412 : 16 03 01 08 9D 01 00 08 99 03 03 ED 80 C7 DC 97 09 67 7D FB 9B 24 A9 35 70 B2 D4 3A 9D EB A9 61 ... : .................g}..$.5p..:...a ... using cached desync profile 10 Window size change 1025 => 1 packet contains partial TLS ClientHello starting reassemble. now we have 1412/2210 req retrans : seq interval 2222385245-2222386656 DELAY desync until reasm is complete (#1) packet: id=27 drop packet: id=28 len=838 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.132 proto=tcp ttl=64 sport=51388 dport=443 flags=AP seq=2222386657 ack_seq=2270335248 TCP: len=798 : B9 29 00 A9 AE D4 AE 9B D8 57 DC 77 B5 FC FB 13 62 BC 3E A9 29 41 22 75 76 32 B5 B5 2B 5B CA 67 ... : .).......W.w....b.>.)A"uv2..+[.g ... using cached desync profile 10 Window size change 1025 => 1 reassemble : feeding data payload size=798. now we have 2210/2210 packet contains full TLS ClientHello req retrans : seq interval 2222385245-2222387454 forced wssize-cutoff DELAY desync until reasm is complete (#2) REPLAYING delayed packet #1 offset 0 REPLAY IP4: 192.168.1.6 => 142.250.74.132 proto=tcp ttl=64 sport=51388 dport=443 flags=A seq=2222385245 ack_seq=2270335248 TCP: len=1412 : 16 03 01 08 9D 01 00 08 99 03 03 ED 80 C7 DC 97 09 67 7D FB 9B 24 A9 35 70 B2 D4 3A 9D EB A9 61 ... : .................g}..$.5p..:...a ... using cached desync profile 10 packet contains full TLS ClientHello hostname: www.google.com discovered l7 protocol discovered hostname desync profile search for tcp target=142.250.74.132:443 l7proto=tls hostname='www.google.com' * hostlist check for profile 1 [C:\Users\ads\Desktop\YTDisBystroold\lists\netrogat.txt] include hostlist check for www.google.com : negative hostlist check for google.com : negative hostlist check for com : negative * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 142.250.74.132 : negative * hostlist check for profile 4 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube.txt] include hostlist check for www.google.com : negative hostlist check for google.com : negative hostlist check for com : negative * hostlist check for profile 6 [C:\Users\ads\Desktop\YTDisBystroold\lists\myhostlist.txt] include hostlist check for www.google.com : negative hostlist check for google.com : negative hostlist check for com : negative [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-blacklist.txt] include hostlist check for www.google.com : negative hostlist check for google.com : negative hostlist check for com : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 142.250.74.132 : negative desync profile 10 matches dpi desync src=192.168.1.6:51388 dst=142.250.74.132:443 regular split pos: 200 normalized regular split pos : 200 seqovl : 1 sending fake(1) 1st tcp segment 0-199 len=200 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending 1st tcp segment 0-199 len=200 seqovl=1 : 00 16 03 01 08 9D 01 00 08 99 03 03 ED 80 C7 DC 97 09 67 7D FB 9B 24 A9 35 70 B2 D4 3A 9D EB A9 ... : ..................g}..$.5p..:... ... sending fake(2) 1st tcp segment 0-199 len=200 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending fake(1) 2nd tcp segment 200-1411 len=1212 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending 2nd tcp segment 200-1411 len=1212 : 6F 67 6C 65 2E 63 6F 6D FE 0D 00 DA 00 00 01 00 01 8A 00 20 4D 0B 97 3E 49 0F B5 3F 1D 4C DF 4B ... : ogle.com........... M..>I..?.L.K ... sending fake(2) 2nd tcp segment 200-1411 len=1212 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... DROPPING delayed packet #1 REPLAYING delayed packet #2 offset 1412 REPLAY IP4: 192.168.1.6 => 142.250.74.132 proto=tcp ttl=64 sport=51388 dport=443 flags=AP seq=2222386657 ack_seq=2270335248 TCP: len=798 : B9 29 00 A9 AE D4 AE 9B D8 57 DC 77 B5 FC FB 13 62 BC 3E A9 29 41 22 75 76 32 B5 B5 2B 5B CA 67 ... : .).......W.w....b.>.)A"uv2..+[.g ... using cached desync profile 10 packet contains full TLS ClientHello hostname: www.google.com dpi desync src=192.168.1.6:51388 dst=142.250.74.132:443 regular split pos: 200 regular split pos is outside of this packet seqovl : 1 SENDING delayed packet #2 unmodified reassemble session finished packet: id=28 drop packet: id=29 len=52 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 142.250.74.132 => 192.168.1.6 proto=tcp ttl=57 sport=443 dport=51389 flags=SA seq=3399644810 ack_seq=1404970260 using cached desync profile 10 incoming TTL 57 packet: id=29 reinject unmodified packet: id=30 len=1452 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.132 proto=tcp ttl=64 sport=51388 dport=443 flags=AP seq=2222386043 ack_seq=2270335248 TCP: len=1412 : 68 72 4C 52 5B BB 52 F8 6E 83 50 3B 19 E7 8E 3C 95 1C 67 9B BF 57 93 84 0F 38 2A 14 55 4A 56 99 ... : hrLR[.R.n.P;...<..g..W...8*.UJV. ... using cached desync profile 10 wssize-cutoff reached (mode n): 4/0 . not changing wssize. not applying tampering to unknown protocol packet: id=30 reinject unmodified packet: id=31 len=1452 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.132 proto=tcp ttl=64 sport=51389 dport=443 flags=A seq=1404970260 ack_seq=3399644811 TCP: len=1412 : 16 03 01 06 D7 01 00 06 D3 03 03 18 56 E9 B0 1D D8 2C A2 DB A5 F5 80 12 4A 30 F8 14 B0 BE 86 42 ... : ............V....,......J0.....B ... using cached desync profile 10 Window size change 1025 => 1 packet contains partial TLS ClientHello starting reassemble. now we have 1412/1756 req retrans : seq interval 1404970260-1404971671 DELAY desync until reasm is complete (#1) packet: id=31 drop packet: id=32 len=384 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.132 proto=tcp ttl=64 sport=51389 dport=443 flags=AP seq=1404971672 ack_seq=3399644811 TCP: len=344 : 38 91 E7 2A AD FE 00 1D 00 20 20 9F F2 E8 61 AB 55 D6 30 BB BB B8 63 22 7F 51 10 A3 F4 1E 53 B2 ... : 8..*..... ...a.U.0...c"Q....S. ... using cached desync profile 10 Window size change 1025 => 1 reassemble : feeding data payload size=344. now we have 1756/1756 packet contains full TLS ClientHello req retrans : seq interval 1404970260-1404972015 forced wssize-cutoff DELAY desync until reasm is complete (#2) REPLAYING delayed packet #1 offset 0 REPLAY IP4: 192.168.1.6 => 142.250.74.132 proto=tcp ttl=64 sport=51389 dport=443 flags=A seq=1404970260 ack_seq=3399644811 TCP: len=1412 : 16 03 01 06 D7 01 00 06 D3 03 03 18 56 E9 B0 1D D8 2C A2 DB A5 F5 80 12 4A 30 F8 14 B0 BE 86 42 ... : ............V....,......J0.....B ... using cached desync profile 10 packet contains full TLS ClientHello hostname: www.google.com discovered l7 protocol discovered hostname desync profile search for tcp target=142.250.74.132:443 l7proto=tls hostname='www.google.com' * hostlist check for profile 1 [C:\Users\ads\Desktop\YTDisBystroold\lists\netrogat.txt] include hostlist check for www.google.com : negative hostlist check for google.com : negative hostlist check for com : negative * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 142.250.74.132 : negative * hostlist check for profile 4 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube.txt] include hostlist check for www.google.com : negative hostlist check for google.com : negative hostlist check for com : negative * hostlist check for profile 6 [C:\Users\ads\Desktop\YTDisBystroold\lists\myhostlist.txt] include hostlist check for www.google.com : negative hostlist check for google.com : negative hostlist check for com : negative [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-blacklist.txt] include hostlist check for www.google.com : negative hostlist check for google.com : negative hostlist check for com : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 142.250.74.132 : negative desync profile 10 matches dpi desync src=192.168.1.6:51389 dst=142.250.74.132:443 regular split pos: 1734 regular split pos is outside of this packet seqovl : 1 SENDING delayed packet #1 unmodified REPLAYING delayed packet #2 offset 1412 REPLAY IP4: 192.168.1.6 => 142.250.74.132 proto=tcp ttl=64 sport=51389 dport=443 flags=AP seq=1404971672 ack_seq=3399644811 TCP: len=344 : 38 91 E7 2A AD FE 00 1D 00 20 20 9F F2 E8 61 AB 55 D6 30 BB BB B8 63 22 7F 51 10 A3 F4 1E 53 B2 ... : 8..*..... ...a.U.0...c"Q....S. ... using cached desync profile 10 packet contains full TLS ClientHello hostname: www.google.com dpi desync src=192.168.1.6:51389 dst=142.250.74.132:443 regular split pos: 1734 normalized regular split pos : 322 seqovl : 1 sending fake(1) 1st tcp segment 0-321 len=322 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending 1st tcp segment 0-321 len=322 seqovl=1 : 00 38 91 E7 2A AD FE 00 1D 00 20 20 9F F2 E8 61 AB 55 D6 30 BB BB B8 63 22 7F 51 10 A3 F4 1E 53 ... : .8..*..... ...a.U.0...c"Q....S ... sending fake(2) 1st tcp segment 0-321 len=322 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending fake(1) 2nd tcp segment 322-343 len=22 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 : ...................... sending 2nd tcp segment 322-343 len=22 : 6F 67 6C 65 2E 63 6F 6D 44 69 00 05 00 03 02 68 32 6A 6A 00 01 00 : ogle.comDi.....h2jj... sending fake(2) 2nd tcp segment 322-343 len=22 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 : ...................... DROPPING delayed packet #2 reassemble session finished packet: id=32 drop packet: id=33 len=114 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.132 proto=tcp ttl=64 sport=51387 dport=443 flags=AP seq=3028820679 ack_seq=3296909871 TCP: len=74 : 14 03 03 00 01 01 17 03 03 00 3F 90 5E F5 7C B4 93 B3 9B 64 A6 93 DB A3 D0 A9 3C 89 8D A2 E1 90 ... : ..........?.^.|....d......<..... ... using cached desync profile 10 wssize-cutoff reached (mode n): 4/0 . not changing wssize. not applying tampering to unknown protocol packet: id=33 reinject unmodified packet: id=34 len=132 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.132 proto=tcp ttl=64 sport=51387 dport=443 flags=AP seq=3028820753 ack_seq=3296909871 TCP: len=92 : 17 03 03 00 57 4D 22 64 8E BD CC C2 27 52 D6 CE 42 70 C6 CF 35 68 E1 B4 38 DC BD 6F 2A 8D D4 1D ... : ....WM"d....'R..Bp..5h..8..o*... ... using cached desync profile 10 wssize-cutoff reached (mode n): 5/0 . not changing wssize. not applying tampering to unknown protocol packet: id=34 reinject unmodified packet: id=35 len=1337 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.132 proto=tcp ttl=64 sport=51387 dport=443 flags=AP seq=3028820845 ack_seq=3296909871 TCP: len=1297 : 17 03 03 05 0C 9E 03 B4 5B 9F 15 AB 5B AE 07 D7 26 4F 2F BF 72 6F B6 04 7E 13 03 D5 AC 96 67 A4 ... : ........[...[...&O/.ro..~.....g. ... using cached desync profile 10 wssize-cutoff reached (mode n): 6/0 . not changing wssize. not applying tampering to unknown protocol packet: id=35 reinject unmodified packet: id=36 len=117 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.132 proto=tcp ttl=64 sport=51387 dport=443 flags=AP seq=3028822142 ack_seq=3296909871 TCP: len=77 : 17 03 03 00 48 4F 88 56 DF BD BB D6 2D 1F FB 46 B8 C9 BA 01 4D DC 9E F8 3E 51 F4 51 81 D2 E2 C1 ... : ....HO.V....-..F....M...>Q.Q.... ... using cached desync profile 10 wssize-cutoff reached (mode n): 7/0 . not changing wssize. not applying tampering to unknown protocol packet: id=36 reinject unmodified packet: id=37 len=200 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.132 proto=tcp ttl=64 sport=51387 dport=443 flags=AP seq=3028822219 ack_seq=3296909871 TCP: len=160 : 17 03 03 00 9B 6A 81 38 66 6D 19 24 27 A8 BC FE 25 01 D3 2E E2 A0 AD A7 70 42 CA F7 11 D4 7C A1 ... : .....j.8fm.$'...%.......pB....|. ... using cached desync profile 10 wssize-cutoff reached (mode n): 8/0 . not changing wssize. not applying tampering to unknown protocol packet: id=37 reinject unmodified packet: id=38 len=40 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 142.250.74.132 => 192.168.1.6 proto=tcp ttl=121 sport=443 dport=51388 flags=AF seq=2270336711 ack_seq=2222387456 using cached desync profile 10 packet: id=38 reinject unmodified packet: id=39 len=40 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 142.250.74.132 => 192.168.1.6 proto=tcp ttl=57 sport=443 dport=51389 flags=AF seq=3399650163 ack_seq=1404972017 using cached desync profile 10 packet: id=39 reinject unmodified packet: id=40 len=71 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.132 proto=tcp ttl=64 sport=51387 dport=443 flags=AP seq=3028822379 ack_seq=3296910860 TCP: len=31 : 17 03 03 00 1A 59 88 18 F1 B8 E1 3C 0F 79 A8 79 CF AC 5A 35 9B 7B 2C 8F 20 68 25 0E 4B 20 96 : .....Y.....<.y.y..Z5.{,. h%.K . using cached desync profile 10 wssize-cutoff reached (mode n): 9/0 . not changing wssize. not applying tampering to unknown protocol packet: id=40 reinject unmodified packet: id=41 len=79 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.132 proto=tcp ttl=64 sport=51387 dport=443 flags=AP seq=3028822410 ack_seq=3296911749 TCP: len=39 : 17 03 03 00 22 20 87 56 35 DC 3A 07 E9 C9 C9 D0 50 4B 5C D3 74 98 1E 45 17 8A 83 E9 22 86 45 DF ... : ...." .V5.:.....PK\.t..E....".E. ... using cached desync profile 10 wssize-cutoff reached (mode n): 10/0 . not changing wssize. not applying tampering to unknown protocol packet: id=41 reinject unmodified packet: id=42 len=79 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.132 proto=tcp ttl=64 sport=51387 dport=443 flags=AP seq=3028822449 ack_seq=3296951494 TCP: len=39 : 17 03 03 00 22 17 F5 56 26 B5 2F C1 4E 53 C2 A5 F0 DE 9D CF DD 24 BD 4C 5D AC C8 54 B3 1F 3B 3F ... : ...."..V&./.NS.......$.L]..T..;? ... using cached desync profile 10 wssize-cutoff reached (mode n): 11/0 . not changing wssize. not applying tampering to unknown protocol packet: id=42 reinject unmodified packet: id=43 len=52 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.163.95 proto=tcp ttl=64 sport=51390 dport=443 flags=S seq=2501991073 ack_seq=0 desync profile search for tcp target=64.233.163.95:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 64.233.163.95 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 64.233.163.95 : negative desync profile 10 matches Window size change 64240 => 1 Scale factor change 8 => 6 packet: id=43 reinject modified len=52 packet: id=44 len=1388 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.138 proto=tcp ttl=64 sport=51352 dport=443 flags=AP seq=2922537995 ack_seq=2247934039 TCP: len=1348 : 17 03 03 05 3F CD 8B 40 1E CC 44 33 E7 26 69 8E F6 93 40 2C 58 4C 72 D8 90 FF 9E AB 57 AA AB 58 ... : ....?..@..D3.&i...@,XLr.....W..X ... desync profile search for tcp target=74.125.131.138:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 74.125.131.138 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 74.125.131.138 : negative desync profile 10 matches not changing wssize. wssize is set but conntrack entry is missing not applying tampering to unknown protocol packet: id=44 reinject unmodified packet: id=45 len=79 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.138 proto=tcp ttl=64 sport=51352 dport=443 flags=AP seq=2922539343 ack_seq=2247934039 TCP: len=39 : 17 03 03 00 22 B1 83 A4 B7 35 60 06 66 A4 21 A3 EE 03 DF D6 DC E1 8C 0C B8 56 48 EF 99 1F 88 F2 ... : ...."....5`.f.!..........VH..... ... desync profile search for tcp target=74.125.131.138:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 74.125.131.138 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 74.125.131.138 : negative desync profile 10 matches not changing wssize. wssize is set but conntrack entry is missing not applying tampering to unknown protocol packet: id=45 reinject unmodified packet: id=46 len=52 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 64.233.163.95 => 192.168.1.6 proto=tcp ttl=122 sport=443 dport=51390 flags=SA seq=1225286907 ack_seq=2501991074 using cached desync profile 10 incoming TTL 122 packet: id=46 reinject unmodified packet: id=47 len=1452 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.163.95 proto=tcp ttl=64 sport=51390 dport=443 flags=A seq=2501991074 ack_seq=1225286908 TCP: len=1412 : 16 03 01 08 F9 01 00 08 F5 03 03 32 0E 65 70 2D EC 60 D0 91 5E CA E4 7A 21 38 C7 72 63 60 51 95 ... : ...........2.ep-.`..^..z!8.rc`Q. ... using cached desync profile 10 Window size change 1025 => 1 packet contains partial TLS ClientHello starting reassemble. now we have 1412/2302 req retrans : seq interval 2501991074-2501992485 DELAY desync until reasm is complete (#1) packet: id=47 drop packet: id=48 len=930 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.163.95 proto=tcp ttl=64 sport=51390 dport=443 flags=AP seq=2501992486 ack_seq=1225286908 TCP: len=890 : 6B CD 47 4B 00 FA 88 40 42 7A B8 FC 99 54 34 5B EB C0 38 B0 CC AC E3 C7 EB 81 71 0C 18 2E 6E 18 ... : k.GK...@Bz...T4[..8.......q...n. ... using cached desync profile 10 Window size change 1025 => 1 reassemble : feeding data payload size=890. now we have 2302/2302 packet contains full TLS ClientHello req retrans : seq interval 2501991074-2501993375 forced wssize-cutoff DELAY desync until reasm is complete (#2) REPLAYING delayed packet #1 offset 0 REPLAY IP4: 192.168.1.6 => 64.233.163.95 proto=tcp ttl=64 sport=51390 dport=443 flags=A seq=2501991074 ack_seq=1225286908 TCP: len=1412 : 16 03 01 08 F9 01 00 08 F5 03 03 32 0E 65 70 2D EC 60 D0 91 5E CA E4 7A 21 38 C7 72 63 60 51 95 ... : ...........2.ep-.`..^..z!8.rc`Q. ... using cached desync profile 10 packet contains full TLS ClientHello hostname: ogads-pa.clients6.google.com discovered l7 protocol discovered hostname desync profile search for tcp target=64.233.163.95:443 l7proto=tls hostname='ogads-pa.clients6.google.com' * hostlist check for profile 1 [C:\Users\ads\Desktop\YTDisBystroold\lists\netrogat.txt] include hostlist check for ogads-pa.clients6.google.com : negative hostlist check for clients6.google.com : negative hostlist check for google.com : negative hostlist check for com : negative * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 64.233.163.95 : negative * hostlist check for profile 4 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube.txt] include hostlist check for ogads-pa.clients6.google.com : negative hostlist check for clients6.google.com : negative hostlist check for google.com : negative hostlist check for com : negative * hostlist check for profile 6 [C:\Users\ads\Desktop\YTDisBystroold\lists\myhostlist.txt] include hostlist check for ogads-pa.clients6.google.com : negative hostlist check for clients6.google.com : negative hostlist check for google.com : negative hostlist check for com : negative [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-blacklist.txt] include hostlist check for ogads-pa.clients6.google.com : negative hostlist check for clients6.google.com : negative hostlist check for google.com : negative hostlist check for com : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 64.233.163.95 : negative desync profile 10 matches dpi desync src=192.168.1.6:51390 dst=64.233.163.95:443 regular split pos: 227 normalized regular split pos : 227 seqovl : 1 sending fake(1) 1st tcp segment 0-226 len=227 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending 1st tcp segment 0-226 len=227 seqovl=1 : 00 16 03 01 08 F9 01 00 08 F5 03 03 32 0E 65 70 2D EC 60 D0 91 5E CA E4 7A 21 38 C7 72 63 60 51 ... : ............2.ep-.`..^..z!8.rc`Q ... sending fake(2) 1st tcp segment 0-226 len=227 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending fake(1) 2nd tcp segment 227-1411 len=1185 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending 2nd tcp segment 227-1411 len=1185 : 6F 67 6C 65 2E 63 6F 6D 00 33 04 EF 04 ED 1A 1A 00 01 00 63 99 04 C0 28 36 8C 1E C5 7F BA 23 13 ... : ogle.com.3.........c...(6....#. ... sending fake(2) 2nd tcp segment 227-1411 len=1185 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... DROPPING delayed packet #1 REPLAYING delayed packet #2 offset 1412 REPLAY IP4: 192.168.1.6 => 64.233.163.95 proto=tcp ttl=64 sport=51390 dport=443 flags=AP seq=2501992486 ack_seq=1225286908 TCP: len=890 : 6B CD 47 4B 00 FA 88 40 42 7A B8 FC 99 54 34 5B EB C0 38 B0 CC AC E3 C7 EB 81 71 0C 18 2E 6E 18 ... : k.GK...@Bz...T4[..8.......q...n. ... using cached desync profile 10 packet contains full TLS ClientHello hostname: ogads-pa.clients6.google.com dpi desync src=192.168.1.6:51390 dst=64.233.163.95:443 regular split pos: 227 regular split pos is outside of this packet seqovl : 1 SENDING delayed packet #2 unmodified reassemble session finished packet: id=48 drop packet: id=49 len=75 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.138 proto=tcp ttl=64 sport=51352 dport=443 flags=AP seq=2922539382 ack_seq=2247936741 TCP: len=35 : 17 03 03 00 1E 33 27 AF DE 0B DE 3E EE 57 03 90 89 3B 2D D6 C1 2F C2 8C 43 B6 43 B6 AE C7 6A D0 ... : .....3'....>.W...;-../..C.C...j. ... desync profile search for tcp target=74.125.131.138:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 74.125.131.138 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 74.125.131.138 : negative desync profile 10 matches not changing wssize. wssize is set but conntrack entry is missing not applying tampering to unknown protocol packet: id=49 reinject unmodified packet: id=50 len=75 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.138 proto=tcp ttl=64 sport=51352 dport=443 flags=AP seq=2922539417 ack_seq=2247936741 TCP: len=35 : 17 03 03 00 1E 86 73 9B B7 8B 6A 15 EE 81 A0 AC 23 5C C2 C3 7A 8C 5A EB BC B6 EF 1E 26 A2 47 C5 ... : ......s...j.....#\..z.Z.....&.G. ... desync profile search for tcp target=74.125.131.138:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 74.125.131.138 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 74.125.131.138 : negative desync profile 10 matches not changing wssize. wssize is set but conntrack entry is missing not applying tampering to unknown protocol packet: id=50 reinject unmodified packet: id=51 len=79 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.138 proto=tcp ttl=64 sport=51352 dport=443 flags=AP seq=2922539452 ack_seq=2247937064 TCP: len=39 : 17 03 03 00 22 66 8F 26 4B FE 80 12 0B F5 59 F7 32 24 00 79 03 91 67 3F 79 4B E8 85 69 D7 9D 13 ... : ...."f.&K.....Y.2$.y..g?yK..i... ... desync profile search for tcp target=74.125.131.138:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 74.125.131.138 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 74.125.131.138 : negative desync profile 10 matches not changing wssize. wssize is set but conntrack entry is missing not applying tampering to unknown protocol packet: id=51 reinject unmodified packet: id=52 len=1236 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.221.132 proto=tcp ttl=64 sport=51353 dport=443 flags=AP seq=3875032604 ack_seq=218368320 TCP: len=1196 : 17 03 03 04 A7 3F 9B A6 2E 6F 16 35 53 93 7A B7 32 27 3F 92 8B 92 90 5A F1 D8 6D 38 F0 CF 93 80 ... : .....?...o.5S.z.2'?....Z..m8.... ... desync profile search for tcp target=173.194.221.132:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 173.194.221.132 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 173.194.221.132 : negative desync profile 10 matches not changing wssize. wssize is set but conntrack entry is missing not applying tampering to unknown protocol packet: id=52 reinject unmodified packet: id=53 len=79 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.221.132 proto=tcp ttl=64 sport=51353 dport=443 flags=AP seq=3875033800 ack_seq=218368320 TCP: len=39 : 17 03 03 00 22 6C C2 28 34 5E E7 08 AC 9C 15 DF 91 6D 11 BB 95 8A 9B BA 50 E1 42 D5 8E 9B B4 F4 ... : ...."l.(4^.......m......P.B..... ... desync profile search for tcp target=173.194.221.132:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 173.194.221.132 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 173.194.221.132 : negative desync profile 10 matches not changing wssize. wssize is set but conntrack entry is missing not applying tampering to unknown protocol packet: id=53 reinject unmodified packet: id=54 len=1452 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.163.95 proto=tcp ttl=64 sport=51390 dport=443 flags=AP seq=2501991964 ack_seq=1225286908 TCP: len=1412 : 34 56 48 15 83 57 88 7A 53 CF 24 D6 9E 50 94 A2 E3 A5 22 8A B5 43 2F 06 07 56 77 5A B8 E2 46 42 ... : 4VH..W.zS.$..P...."..C/..VwZ..FB ... using cached desync profile 10 wssize-cutoff reached (mode n): 4/0 . not changing wssize. not applying tampering to unknown protocol packet: id=54 reinject unmodified packet: id=55 len=114 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.163.95 proto=tcp ttl=64 sport=51390 dport=443 flags=AP seq=2501993376 ack_seq=1225288385 TCP: len=74 : 14 03 03 00 01 01 17 03 03 00 3F EA 1C A1 75 8D 57 5F 04 4F ED 47 C0 BB F9 F1 3E ED E8 4C 2C F1 ... : ..........?...u.W_.O.G....>..L,. ... using cached desync profile 10 wssize-cutoff reached (mode n): 5/0 . not changing wssize. not applying tampering to unknown protocol packet: id=55 reinject unmodified packet: id=56 len=132 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.163.95 proto=tcp ttl=64 sport=51390 dport=443 flags=AP seq=2501993450 ack_seq=1225288385 TCP: len=92 : 17 03 03 00 57 67 4E DB C2 95 5D 2F A0 54 AC 87 BE 83 C5 CB A9 DB 76 12 3F 53 9A FC FF 6B 7E 02 ... : ....WgN...]/.T........v.?S...k~. ... using cached desync profile 10 wssize-cutoff reached (mode n): 6/0 . not changing wssize. not applying tampering to unknown protocol packet: id=56 reinject unmodified packet: id=57 len=1452 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.163.95 proto=tcp ttl=64 sport=51390 dport=443 flags=A seq=2501993542 ack_seq=1225288385 TCP: len=1412 : 17 03 03 0A 95 9C A4 4E EA 46 35 DC 10 C8 02 F5 E2 B8 72 09 CC E0 19 1B 1B C5 F2 A1 24 5B 10 36 ... : .......N.F5.......r.........$[.6 ... using cached desync profile 10 wssize-cutoff reached (mode n): 7/0 . not changing wssize. not applying tampering to unknown protocol packet: id=57 reinject unmodified packet: id=58 len=1342 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.163.95 proto=tcp ttl=64 sport=51390 dport=443 flags=AP seq=2501994954 ack_seq=1225288385 TCP: len=1302 : 06 3B E9 AF 01 F8 ED 4B 67 00 62 D4 95 F1 E3 D4 38 F0 54 4B CB 76 EF E2 31 00 79 D9 70 01 74 DB ... : .;.....Kg.b.....8.TK.v..1.y.p.t. ... using cached desync profile 10 wssize-cutoff reached (mode n): 8/0 . not changing wssize. not applying tampering to unknown protocol packet: id=58 reinject unmodified packet: id=59 len=140 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.163.95 proto=tcp ttl=64 sport=51390 dport=443 flags=AP seq=2501996256 ack_seq=1225288385 TCP: len=100 : 17 03 03 00 5F BC D6 C4 3E 4D BE 58 25 9A 8B F4 55 9E 60 18 1D DA 44 7B C2 01 45 3D 6B F7 A0 E1 ... : ...._...>M.X%...U.`...D{..E=k... ... using cached desync profile 10 wssize-cutoff reached (mode n): 9/0 . not changing wssize. not applying tampering to unknown protocol packet: id=59 reinject unmodified packet: id=60 len=79 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.221.132 proto=tcp ttl=64 sport=51353 dport=443 flags=AP seq=3875033839 ack_seq=218369459 TCP: len=39 : 17 03 03 00 22 14 AB C2 BC 13 1E 67 DA EC 36 62 19 95 84 F2 AB 9E 27 00 17 4A 76 37 BD 1C 6A A6 ... : ...."......g..6b......'..Jv7..j. ... desync profile search for tcp target=173.194.221.132:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 173.194.221.132 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 173.194.221.132 : negative desync profile 10 matches not changing wssize. wssize is set but conntrack entry is missing not applying tampering to unknown protocol packet: id=60 reinject unmodified packet: id=61 len=75 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.221.132 proto=tcp ttl=64 sport=51353 dport=443 flags=AP seq=3875033878 ack_seq=218369459 TCP: len=35 : 17 03 03 00 1E AF 4E 04 2E 46 90 23 E7 92 08 51 79 71 C6 AC FF A5 98 1F B6 6B 3C 98 91 C1 D1 84 ... : ......N..F.#...Qyq.......k<..... ... desync profile search for tcp target=173.194.221.132:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 173.194.221.132 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 173.194.221.132 : negative desync profile 10 matches not changing wssize. wssize is set but conntrack entry is missing not applying tampering to unknown protocol packet: id=61 reinject unmodified packet: id=62 len=71 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.163.95 proto=tcp ttl=64 sport=51390 dport=443 flags=AP seq=2501996356 ack_seq=1225289371 TCP: len=31 : 17 03 03 00 1A 44 F4 AF 8A 77 EB E0 C9 6D F8 8E 9E F8 9D 57 E3 68 D6 4A DC B2 51 4F C4 BD CA : .....D...w...m.....W.h.J..QO... using cached desync profile 10 wssize-cutoff reached (mode n): 10/0 . not changing wssize. not applying tampering to unknown protocol packet: id=62 reinject unmodified packet: id=63 len=79 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.163.95 proto=tcp ttl=64 sport=51390 dport=443 flags=AP seq=2501996387 ack_seq=1225290519 TCP: len=39 : 17 03 03 00 22 2A 9F 54 97 19 DA 58 FE 69 F3 81 8A AC 32 EE 0C 3A 3A 77 19 12 CB 48 2D D6 58 05 ... : ...."*.T...X.i....2..::w...H-.X. ... using cached desync profile 10 wssize-cutoff reached (mode n): 11/0 . not changing wssize. not applying tampering to unknown protocol packet: id=63 reinject unmodified packet: id=64 len=1452 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 108.177.14.101 proto=tcp ttl=64 sport=51350 dport=443 flags=A seq=518117113 ack_seq=2834651930 TCP: len=1412 : 17 03 03 0A 2D CB FD 43 01 48 3D 5B 3E A0 4B 1A 0B 32 DB 65 91 BD 83 74 31 B1 93 EF 96 14 A8 17 ... : ....-..C.H=[>.K..2.e...t1....... ... desync profile search for tcp target=108.177.14.101:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 108.177.14.101 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 108.177.14.101 : negative desync profile 10 matches not changing wssize. wssize is set but conntrack entry is missing not applying tampering to unknown protocol packet: id=64 reinject unmodified packet: id=65 len=1238 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 108.177.14.101 proto=tcp ttl=64 sport=51350 dport=443 flags=AP seq=518118525 ack_seq=2834651930 TCP: len=1198 : FB D0 DD BF 7E 9D 9A 62 E2 D4 5C C9 19 57 95 D3 85 84 95 EA 2E 69 E3 62 26 3F E8 1A 47 4E E3 7E ... : ....~..b..\..W.......i.b&?..GN.~ ... desync profile search for tcp target=108.177.14.101:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 108.177.14.101 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 108.177.14.101 : negative desync profile 10 matches not changing wssize. wssize is set but conntrack entry is missing not applying tampering to unknown protocol packet: id=65 reinject unmodified packet: id=66 len=79 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 108.177.14.101 proto=tcp ttl=64 sport=51350 dport=443 flags=AP seq=518119723 ack_seq=2834651930 TCP: len=39 : 17 03 03 00 22 28 2F 47 DD 60 05 6B 8C DD B4 20 AA 40 82 A2 CB 99 78 23 B6 39 85 CF B8 CF DD AF ... : ...."(/G.`.k... .@....x#.9...... ... desync profile search for tcp target=108.177.14.101:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 108.177.14.101 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 108.177.14.101 : negative desync profile 10 matches not changing wssize. wssize is set but conntrack entry is missing not applying tampering to unknown protocol packet: id=66 reinject unmodified packet: id=67 len=1452 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 108.177.14.101 proto=tcp ttl=64 sport=51350 dport=443 flags=A seq=518119762 ack_seq=2834651930 TCP: len=1412 : 17 03 03 05 D2 3E 10 DC 97 45 E0 59 35 0E CC 07 FC EB 82 31 10 EE AE 70 28 00 2A B8 86 A4 6C 0B ... : .....>...E.Y5......1...p(.*...l. ... desync profile search for tcp target=108.177.14.101:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 108.177.14.101 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 108.177.14.101 : negative desync profile 10 matches not changing wssize. wssize is set but conntrack entry is missing not applying tampering to unknown protocol packet: id=67 reinject unmodified packet: id=68 len=123 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 108.177.14.101 proto=tcp ttl=64 sport=51350 dport=443 flags=AP seq=518121174 ack_seq=2834651930 TCP: len=83 : D2 92 68 15 C3 B7 1C 5D 4B 6D 9A 7C 9A 65 33 1B 8F BB 42 06 8D B7 F0 8F 46 5E 3A 85 11 C5 68 75 ... : ..h....]Km.|.e3...B.....F^:...hu ... desync profile search for tcp target=108.177.14.101:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 108.177.14.101 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 108.177.14.101 : negative desync profile 10 matches not changing wssize. wssize is set but conntrack entry is missing not applying tampering to unknown protocol packet: id=68 reinject unmodified packet: id=69 len=75 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 108.177.14.101 proto=tcp ttl=64 sport=51350 dport=443 flags=AP seq=518121257 ack_seq=2834652851 TCP: len=35 : 17 03 03 00 1E 47 25 F2 2D 01 11 ED F4 2F D4 47 D2 78 EF DA 3D 40 5E 3D 83 BF DA DB 56 ED 42 92 ... : .....G%.-..../.G.x..=@^=....V.B. ... desync profile search for tcp target=108.177.14.101:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 108.177.14.101 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 108.177.14.101 : negative desync profile 10 matches not changing wssize. wssize is set but conntrack entry is missing not applying tampering to unknown protocol packet: id=69 reinject unmodified packet: id=70 len=79 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 108.177.14.101 proto=tcp ttl=64 sport=51350 dport=443 flags=AP seq=518121292 ack_seq=2834652851 TCP: len=39 : 17 03 03 00 22 BF D2 68 6C CF 2B D8 5F 2A 86 DA E2 3F 19 8C FB 7E BE 11 BA A1 39 3F 1A 9F E8 32 ... : ...."..hl.+._*...?...~....9?...2 ... desync profile search for tcp target=108.177.14.101:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 108.177.14.101 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 108.177.14.101 : negative desync profile 10 matches not changing wssize. wssize is set but conntrack entry is missing not applying tampering to unknown protocol packet: id=70 reinject unmodified packet: id=71 len=79 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.74 proto=tcp ttl=64 sport=51385 dport=443 flags=AP seq=1697507783 ack_seq=3045730351 TCP: len=39 : 17 03 03 00 22 7C 5F 0E 64 E5 B8 D1 0D AC 87 9B 55 F5 BE F2 45 8A 9F 2A 0C AF AB 8A 4A E7 1A B2 ... : ...."|_.d.......U...E..*....J... ... desync profile search for tcp target=142.250.74.74:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 142.250.74.74 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 142.250.74.74 : negative desync profile 10 matches not changing wssize. wssize is set but conntrack entry is missing not applying tampering to unknown protocol packet: id=71 reinject unmodified packet: id=72 len=79 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.182 proto=tcp ttl=64 sport=51383 dport=443 flags=AP seq=1662326821 ack_seq=3143844573 TCP: len=39 : 17 03 03 00 22 E3 DE 20 0A 43 DD 55 68 0C A9 4E B8 AB 4E AF 89 E8 01 32 4E C8 FB 28 5F 99 A5 3B ... : ....".. .C.Uh..N..N....2N..(_..; ... desync profile search for tcp target=142.250.74.182:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 142.250.74.182 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 142.250.74.182 : negative desync profile 10 matches not changing wssize. wssize is set but conntrack entry is missing not applying tampering to unknown protocol packet: id=72 reinject unmodified packet: id=73 len=79 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.182 proto=tcp ttl=64 sport=51383 dport=443 flags=AP seq=1662326821 ack_seq=3143844573 TCP: len=39 : 17 03 03 00 22 E3 DE 20 0A 43 DD 55 68 0C A9 4E B8 AB 4E AF 89 E8 01 32 4E C8 FB 28 5F 99 A5 3B ... : ....".. .C.Uh..N..N....2N..(_..; ... desync profile search for tcp target=142.250.74.182:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 142.250.74.182 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 142.250.74.182 : negative desync profile 10 matches not changing wssize. wssize is set but conntrack entry is missing not applying tampering to unknown protocol packet: id=73 reinject unmodified packet: id=74 len=41 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 34.107.221.82 proto=tcp ttl=64 sport=51361 dport=80 flags=A seq=1602401641 ack_seq=2961765197 TCP: len=1 : 00 : . desync profile search for tcp target=34.107.221.82:80 l7proto=unknown hostname='' desync profile 0 matches not applying tampering to unknown protocol packet: id=74 reinject unmodified packet: id=75 len=41 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 34.107.221.82 proto=tcp ttl=64 sport=51368 dport=80 flags=A seq=3571870220 ack_seq=3055136677 TCP: len=1 : 00 : . desync profile search for tcp target=34.107.221.82:80 l7proto=unknown hostname='' desync profile 0 matches not applying tampering to unknown protocol packet: id=75 reinject unmodified packet: id=76 len=40 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 74.125.131.138 => 192.168.1.6 proto=tcp ttl=122 sport=443 dport=51352 flags=AF seq=2247937103 ack_seq=2922539492 desync profile search for tcp target=192.168.1.6:51352 l7proto=unknown hostname='' desync profile 0 matches packet: id=76 reinject unmodified packet: id=77 len=40 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 64.233.162.94 => 192.168.1.6 proto=tcp ttl=122 sport=443 dport=51348 flags=AF seq=3552374698 ack_seq=492115062 desync profile search for tcp target=192.168.1.6:51348 l7proto=unknown hostname='' desync profile 0 matches packet: id=77 reinject unmodified packet: id=78 len=40 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 64.233.163.95 => 192.168.1.6 proto=tcp ttl=122 sport=443 dport=51390 flags=AF seq=1225290519 ack_seq=2501996427 using cached desync profile 10 packet: id=78 reinject unmodified packet: id=79 len=40 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 64.233.165.198 => 192.168.1.6 proto=tcp ttl=120 sport=443 dport=51349 flags=AF seq=2866331557 ack_seq=1050139310 desync profile search for tcp target=192.168.1.6:51349 l7proto=unknown hostname='' desync profile 0 matches packet: id=79 reinject unmodified packet: id=80 len=40 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 108.177.14.101 => 192.168.1.6 proto=tcp ttl=120 sport=443 dport=51350 flags=AF seq=2834652851 ack_seq=518121332 desync profile search for tcp target=192.168.1.6:51350 l7proto=unknown hostname='' desync profile 0 matches packet: id=80 reinject unmodified packet: id=81 len=40 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 142.250.74.132 => 192.168.1.6 proto=tcp ttl=59 sport=443 dport=51387 flags=AF seq=3296951494 ack_seq=3028822489 using cached desync profile 10 packet: id=81 reinject unmodified packet: id=82 len=40 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 142.250.74.42 => 192.168.1.6 proto=tcp ttl=122 sport=443 dport=51356 flags=AF seq=3980507340 ack_seq=730719777 desync profile search for tcp target=192.168.1.6:51356 l7proto=unknown hostname='' desync profile 0 matches packet: id=82 reinject unmodified packet: id=83 len=40 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 173.194.221.132 => 192.168.1.6 proto=tcp ttl=120 sport=443 dport=51353 flags=AF seq=218369459 ack_seq=3875033914 desync profile search for tcp target=192.168.1.6:51353 l7proto=unknown hostname='' desync profile 0 matches packet: id=83 reinject unmodified packet: id=84 len=40 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 108.177.14.101 => 192.168.1.6 proto=tcp ttl=120 sport=443 dport=51347 flags=AF seq=1653185781 ack_seq=3558292430 desync profile search for tcp target=192.168.1.6:51347 l7proto=unknown hostname='' desync profile 0 matches packet: id=84 reinject unmodified packet: id=85 len=40 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 74.125.131.94 => 192.168.1.6 proto=tcp ttl=120 sport=443 dport=51386 flags=AF seq=4286976887 ack_seq=1861331160 desync profile search for tcp target=192.168.1.6:51386 l7proto=unknown hostname='' desync profile 0 matches packet: id=85 reinject unmodified packet: id=86 len=52 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.161.94 proto=tcp ttl=64 sport=51391 dport=443 flags=S seq=3792575836 ack_seq=0 desync profile search for tcp target=64.233.161.94:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 64.233.161.94 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 64.233.161.94 : negative desync profile 10 matches Window size change 64240 => 1 Scale factor change 8 => 6 packet: id=86 reinject modified len=52 packet: id=87 len=52 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 64.233.161.94 => 192.168.1.6 proto=tcp ttl=120 sport=443 dport=51391 flags=SA seq=3769806383 ack_seq=3792575837 using cached desync profile 10 incoming TTL 120 packet: id=87 reinject unmodified packet: id=88 len=1452 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.161.94 proto=tcp ttl=64 sport=51391 dport=443 flags=A seq=3792575837 ack_seq=3769806384 TCP: len=1412 : 16 03 01 07 06 01 00 07 02 03 03 61 65 68 01 D7 4C EC 6A CF 09 A3 23 E9 71 9A A0 6D AF 47 35 B6 ... : ...........aeh..L.j...#.q..m.G5. ... using cached desync profile 10 Window size change 1025 => 1 packet contains partial TLS ClientHello starting reassemble. now we have 1412/1803 req retrans : seq interval 3792575837-3792577248 DELAY desync until reasm is complete (#1) packet: id=88 drop packet: id=89 len=431 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.161.94 proto=tcp ttl=64 sport=51391 dport=443 flags=AP seq=3792577249 ack_seq=3769806384 TCP: len=391 : 00 87 B7 D0 8B 92 90 C7 11 4B CA 82 0C 18 74 20 A5 B8 94 9C 70 1E E2 27 B4 87 26 D4 55 5A A8 5C ... : .........K....t ....p..'..&.UZ.\ ... using cached desync profile 10 Window size change 1025 => 1 reassemble : feeding data payload size=391. now we have 1803/1803 packet contains full TLS ClientHello req retrans : seq interval 3792575837-3792577639 forced wssize-cutoff DELAY desync until reasm is complete (#2) REPLAYING delayed packet #1 offset 0 REPLAY IP4: 192.168.1.6 => 64.233.161.94 proto=tcp ttl=64 sport=51391 dport=443 flags=A seq=3792575837 ack_seq=3769806384 TCP: len=1412 : 16 03 01 07 06 01 00 07 02 03 03 61 65 68 01 D7 4C EC 6A CF 09 A3 23 E9 71 9A A0 6D AF 47 35 B6 ... : ...........aeh..L.j...#.q..m.G5. ... using cached desync profile 10 packet contains full TLS ClientHello hostname: clientservices.googleapis.com discovered l7 protocol discovered hostname desync profile search for tcp target=64.233.161.94:443 l7proto=tls hostname='clientservices.googleapis.com' * hostlist check for profile 1 [C:\Users\ads\Desktop\YTDisBystroold\lists\netrogat.txt] include hostlist check for clientservices.googleapis.com : negative hostlist check for googleapis.com : negative hostlist check for com : negative * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 64.233.161.94 : negative * hostlist check for profile 4 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube.txt] include hostlist check for clientservices.googleapis.com : negative hostlist check for googleapis.com : negative hostlist check for com : negative * hostlist check for profile 6 [C:\Users\ads\Desktop\YTDisBystroold\lists\myhostlist.txt] include hostlist check for clientservices.googleapis.com : negative hostlist check for googleapis.com : negative hostlist check for com : negative [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-blacklist.txt] include hostlist check for clientservices.googleapis.com : negative hostlist check for googleapis.com : negative hostlist check for com : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 64.233.161.94 : negative desync profile 10 matches dpi desync src=192.168.1.6:51391 dst=64.233.161.94:443 regular split pos: 1700 regular split pos is outside of this packet seqovl : 1 SENDING delayed packet #1 unmodified REPLAYING delayed packet #2 offset 1412 REPLAY IP4: 192.168.1.6 => 64.233.161.94 proto=tcp ttl=64 sport=51391 dport=443 flags=AP seq=3792577249 ack_seq=3769806384 TCP: len=391 : 00 87 B7 D0 8B 92 90 C7 11 4B CA 82 0C 18 74 20 A5 B8 94 9C 70 1E E2 27 B4 87 26 D4 55 5A A8 5C ... : .........K....t ....p..'..&.UZ.\ ... using cached desync profile 10 packet contains full TLS ClientHello hostname: clientservices.googleapis.com dpi desync src=192.168.1.6:51391 dst=64.233.161.94:443 regular split pos: 1700 normalized regular split pos : 288 seqovl : 1 sending fake(1) 1st tcp segment 0-287 len=288 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending 1st tcp segment 0-287 len=288 seqovl=1 : 00 00 87 B7 D0 8B 92 90 C7 11 4B CA 82 0C 18 74 20 A5 B8 94 9C 70 1E E2 27 B4 87 26 D4 55 5A A8 ... : ..........K....t ....p..'..&.UZ. ... sending fake(2) 1st tcp segment 0-287 len=288 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending fake(1) 2nd tcp segment 288-390 len=103 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending 2nd tcp segment 288-390 len=103 : 6C 65 61 70 69 73 2E 63 6F 6D 00 10 00 0E 00 0C 02 68 32 08 68 74 74 70 2F 31 2E 31 00 0D 00 12 ... : leapis.com.......h2.http/1.1.... ... sending fake(2) 2nd tcp segment 288-390 len=103 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... DROPPING delayed packet #2 reassemble session finished packet: id=89 drop packet: id=90 len=52 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.162.84 proto=tcp ttl=64 sport=51392 dport=443 flags=S seq=769941507 ack_seq=0 desync profile search for tcp target=64.233.162.84:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 64.233.162.84 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 64.233.162.84 : negative desync profile 10 matches Window size change 64240 => 1 Scale factor change 8 => 6 packet: id=90 reinject modified len=52 packet: id=91 len=52 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 64.233.162.84 => 192.168.1.6 proto=tcp ttl=122 sport=443 dport=51392 flags=SA seq=4201795383 ack_seq=769941508 using cached desync profile 10 incoming TTL 122 packet: id=91 reinject unmodified packet: id=92 len=1452 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.162.84 proto=tcp ttl=64 sport=51392 dport=443 flags=A seq=769941508 ack_seq=4201795384 TCP: len=1412 : 16 03 01 06 DC 01 00 06 D8 03 03 9A 5E CB E6 0C 05 7F FF 1F 93 8D E1 71 39 1F 47 94 29 C0 4B A0 ... : ............^.........q9.G.).K. ... using cached desync profile 10 Window size change 1025 => 1 packet contains partial TLS ClientHello starting reassemble. now we have 1412/1761 req retrans : seq interval 769941508-769942919 DELAY desync until reasm is complete (#1) packet: id=92 drop packet: id=93 len=389 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.162.84 proto=tcp ttl=64 sport=51392 dport=443 flags=AP seq=769942920 ack_seq=4201795384 TCP: len=349 : 00 01 00 00 20 7D 87 39 1B 4E 1E 0C 61 1D 04 44 FA 44 F8 3F FC 0D 8F 5C CD 4F C2 B8 63 D0 33 DD ... : .... }.9.N..a..D.D.?...\.O..c.3. ... using cached desync profile 10 Window size change 1025 => 1 reassemble : feeding data payload size=349. now we have 1761/1761 packet contains full TLS ClientHello req retrans : seq interval 769941508-769943268 forced wssize-cutoff DELAY desync until reasm is complete (#2) REPLAYING delayed packet #1 offset 0 REPLAY IP4: 192.168.1.6 => 64.233.162.84 proto=tcp ttl=64 sport=51392 dport=443 flags=A seq=769941508 ack_seq=4201795384 TCP: len=1412 : 16 03 01 06 DC 01 00 06 D8 03 03 9A 5E CB E6 0C 05 7F FF 1F 93 8D E1 71 39 1F 47 94 29 C0 4B A0 ... : ............^.........q9.G.).K. ... using cached desync profile 10 packet contains full TLS ClientHello hostname: accounts.google.com discovered l7 protocol discovered hostname desync profile search for tcp target=64.233.162.84:443 l7proto=tls hostname='accounts.google.com' * hostlist check for profile 1 [C:\Users\ads\Desktop\YTDisBystroold\lists\netrogat.txt] include hostlist check for accounts.google.com : negative hostlist check for google.com : negative hostlist check for com : negative * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 64.233.162.84 : negative * hostlist check for profile 4 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube.txt] include hostlist check for accounts.google.com : negative hostlist check for google.com : negative hostlist check for com : negative * hostlist check for profile 6 [C:\Users\ads\Desktop\YTDisBystroold\lists\myhostlist.txt] include hostlist check for accounts.google.com : negative hostlist check for google.com : negative hostlist check for com : negative [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-blacklist.txt] include hostlist check for accounts.google.com : negative hostlist check for google.com : negative hostlist check for com : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 64.233.162.84 : negative desync profile 10 matches dpi desync src=192.168.1.6:51392 dst=64.233.162.84:443 regular split pos: 1694 regular split pos is outside of this packet seqovl : 1 SENDING delayed packet #1 unmodified REPLAYING delayed packet #2 offset 1412 REPLAY IP4: 192.168.1.6 => 64.233.162.84 proto=tcp ttl=64 sport=51392 dport=443 flags=AP seq=769942920 ack_seq=4201795384 TCP: len=349 : 00 01 00 00 20 7D 87 39 1B 4E 1E 0C 61 1D 04 44 FA 44 F8 3F FC 0D 8F 5C CD 4F C2 B8 63 D0 33 DD ... : .... }.9.N..a..D.D.?...\.O..c.3. ... using cached desync profile 10 packet contains full TLS ClientHello hostname: accounts.google.com dpi desync src=192.168.1.6:51392 dst=64.233.162.84:443 regular split pos: 1694 normalized regular split pos : 282 seqovl : 1 sending fake(1) 1st tcp segment 0-281 len=282 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending 1st tcp segment 0-281 len=282 seqovl=1 : 00 00 01 00 00 20 7D 87 39 1B 4E 1E 0C 61 1D 04 44 FA 44 F8 3F FC 0D 8F 5C CD 4F C2 B8 63 D0 33 ... : ..... }.9.N..a..D.D.?...\.O..c.3 ... sending fake(2) 1st tcp segment 0-281 len=282 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending fake(1) 2nd tcp segment 282-348 len=67 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending 2nd tcp segment 282-348 len=67 : 6F 67 6C 65 2E 63 6F 6D 00 2B 00 07 06 8A 8A 03 04 03 03 00 23 00 00 00 1B 00 03 02 00 02 00 12 ... : ogle.com.+..........#........... ... sending fake(2) 2nd tcp segment 282-348 len=67 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... DROPPING delayed packet #2 reassemble session finished packet: id=93 drop packet: id=94 len=114 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.161.94 proto=tcp ttl=64 sport=51391 dport=443 flags=AP seq=3792577640 ack_seq=3769812143 TCP: len=74 : 14 03 03 00 01 01 17 03 03 00 3F D2 2C EB E3 40 01 A2 DC C3 22 69 B3 A0 B5 2E FA BF 56 EE 62 30 ... : ..........?.,..@...."i......V.b0 ... using cached desync profile 10 wssize-cutoff reached (mode n): 4/0 . not changing wssize. not applying tampering to unknown protocol packet: id=94 reinject unmodified packet: id=95 len=132 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.161.94 proto=tcp ttl=64 sport=51391 dport=443 flags=AP seq=3792577714 ack_seq=3769812143 TCP: len=92 : 17 03 03 00 57 E7 53 43 45 A2 06 AF FC 6C 08 65 59 87 72 2B DB 4C 3E C0 FC 73 8F BB 28 EF B1 E4 ... : ....W.SCE....l.eY.r+.L>..s..(... ... using cached desync profile 10 wssize-cutoff reached (mode n): 5/0 . not changing wssize. not applying tampering to unknown protocol packet: id=95 reinject unmodified packet: id=96 len=404 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.161.94 proto=tcp ttl=64 sport=51391 dport=443 flags=AP seq=3792577806 ack_seq=3769812143 TCP: len=364 : 17 03 03 01 67 27 37 0F 32 8F 14 2A EB 31 75 6F 94 06 5C 33 C6 2B B0 87 DE 66 A9 97 05 05 51 F9 ... : ....g'7.2..*.1uo..\3.+...f....Q. ... using cached desync profile 10 wssize-cutoff reached (mode n): 6/0 . not changing wssize. not applying tampering to unknown protocol packet: id=96 reinject unmodified packet: id=97 len=71 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.161.94 proto=tcp ttl=64 sport=51391 dport=443 flags=AP seq=3792578170 ack_seq=3769813131 TCP: len=31 : 17 03 03 00 1A A1 4E A6 48 95 A5 10 65 41 7E 24 EE AC 02 E5 CD 0F D7 3E 3C 13 A7 19 0D A5 D3 : ......N.H...eA~$.......><...... using cached desync profile 10 wssize-cutoff reached (mode n): 7/0 . not changing wssize. not applying tampering to unknown protocol packet: id=97 reinject unmodified packet: id=98 len=79 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.161.94 proto=tcp ttl=64 sport=51391 dport=443 flags=AP seq=3792578201 ack_seq=3769814669 TCP: len=39 : 17 03 03 00 22 07 0E CF EB AC 26 66 C7 F9 3E D4 0D FD AE CD E3 BD AC 6F 3D 80 BC D8 DF 92 EE 24 ... : ....".....&f..>........o=......$ ... using cached desync profile 10 wssize-cutoff reached (mode n): 8/0 . not changing wssize. not applying tampering to unknown protocol packet: id=98 reinject unmodified packet: id=99 len=114 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.162.84 proto=tcp ttl=64 sport=51392 dport=443 flags=AP seq=769943269 ack_seq=4201800771 TCP: len=74 : 14 03 03 00 01 01 17 03 03 00 3F 82 78 13 47 5A 3C E2 6E D0 9A B2 41 25 8D C0 3A 43 D9 C0 37 2B ... : ..........?.x.GZ<.n...A%..:C..7+ ... using cached desync profile 10 wssize-cutoff reached (mode n): 4/0 . not changing wssize. not applying tampering to unknown protocol packet: id=99 reinject unmodified packet: id=100 len=132 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.162.84 proto=tcp ttl=64 sport=51392 dport=443 flags=AP seq=769943343 ack_seq=4201800771 TCP: len=92 : 17 03 03 00 57 9B F3 9A C0 04 0A 84 DD A5 9D 2B AC 6C BF 2B 4D C1 7D 7D 45 B9 34 69 85 E8 6E 7C ... : ....W..........+.l.+M.}}E.4i..n| ... using cached desync profile 10 wssize-cutoff reached (mode n): 5/0 . not changing wssize. not applying tampering to unknown protocol packet: id=100 reinject unmodified packet: id=101 len=1452 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.162.84 proto=tcp ttl=64 sport=51392 dport=443 flags=A seq=769943435 ack_seq=4201800771 TCP: len=1412 : 17 03 03 0C 47 BD 09 69 D3 CD 2D 06 CE 57 2B 6D FE 66 1D E3 5E 22 C1 9D FE 22 7C 02 14 4A 68 7A ... : ....G..i..-..W+m.f..^"..."|..Jhz ... using cached desync profile 10 wssize-cutoff reached (mode n): 6/0 . not changing wssize. not applying tampering to unknown protocol packet: id=101 reinject unmodified packet: id=102 len=1452 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.162.84 proto=tcp ttl=64 sport=51392 dport=443 flags=A seq=769944847 ack_seq=4201800771 TCP: len=1412 : 02 CA E0 E6 2F 13 18 52 C9 BA 85 A0 3B 80 C1 7B 6B 7B 7C 75 1E EA 6B 93 AE 9E 5A D8 E8 F8 D9 5A ... : ..../..R....;..{k{|u..k...Z....Z ... using cached desync profile 10 wssize-cutoff reached (mode n): 7/0 . not changing wssize. not applying tampering to unknown protocol packet: id=102 reinject unmodified packet: id=103 len=364 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.162.84 proto=tcp ttl=64 sport=51392 dport=443 flags=AP seq=769946259 ack_seq=4201800771 TCP: len=324 : 97 DB F5 15 AA 13 48 70 CF FD 37 2F AF 84 17 AC 00 19 E1 C8 56 51 B6 A2 AB 11 01 10 7E 73 A7 05 ... : ......Hp..7/........VQ......~s.. ... using cached desync profile 10 wssize-cutoff reached (mode n): 8/0 . not changing wssize. not applying tampering to unknown protocol packet: id=103 reinject unmodified packet: id=104 len=72 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.162.84 proto=tcp ttl=64 sport=51392 dport=443 flags=AP seq=769946583 ack_seq=4201800771 TCP: len=32 : 17 03 03 00 1B FB B5 35 62 83 38 23 F0 93 65 30 0D 71 B1 7D 1F 73 58 1D 9E FB A0 D0 3C AE 8E 64 : .......5b.8#..e0.q.}.sX.....<..d using cached desync profile 10 wssize-cutoff reached (mode n): 9/0 . not changing wssize. not applying tampering to unknown protocol packet: id=104 reinject unmodified packet: id=105 len=41 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 34.107.221.82 proto=tcp ttl=64 sport=51361 dport=80 flags=A seq=1602401641 ack_seq=2961765197 TCP: len=1 : 00 : . desync profile search for tcp target=34.107.221.82:80 l7proto=unknown hostname='' desync profile 0 matches not applying tampering to unknown protocol packet: id=105 reinject unmodified packet: id=106 len=71 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.162.84 proto=tcp ttl=64 sport=51392 dport=443 flags=AP seq=769946615 ack_seq=4201801739 TCP: len=31 : 17 03 03 00 1A 04 23 4A B8 6F 80 ED AB F2 1D 4A 73 F0 F8 22 81 1B 27 58 5F C2 70 6A BD 6D 6E : ......#J.o.....Js.."..'X_.pj.mn using cached desync profile 10 wssize-cutoff reached (mode n): 10/0 . not changing wssize. not applying tampering to unknown protocol packet: id=106 reinject unmodified packet: id=107 len=41 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 34.107.221.82 proto=tcp ttl=64 sport=51368 dport=80 flags=A seq=3571870220 ack_seq=3055136677 TCP: len=1 : 00 : . desync profile search for tcp target=34.107.221.82:80 l7proto=unknown hostname='' desync profile 0 matches not applying tampering to unknown protocol packet: id=107 reinject unmodified packet: id=108 len=79 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.162.84 proto=tcp ttl=64 sport=51392 dport=443 flags=AP seq=769946646 ack_seq=4201804721 TCP: len=39 : 17 03 03 00 22 21 D6 EF 3A D3 FD 5C 8C 68 EE 0B 0A 88 2D FC 4C 98 A2 F2 73 17 9D DA 30 EB 34 46 ... : ...."!..:..\.h....-.L...s...0.4F ... using cached desync profile 10 wssize-cutoff reached (mode n): 11/0 . not changing wssize. not applying tampering to unknown protocol packet: id=108 reinject unmodified packet: id=109 len=1278 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.36 proto=udp ttl=64 sport=57240 dport=443 UDP: len=1250 : CF 00 00 00 01 08 90 B6 61 B3 97 87 47 FC 00 00 44 D0 08 08 AB 89 4E 23 53 80 36 E1 2B F9 19 29 ... : ........a...G...D.....N#S.6.+..) ... desync profile search for udp target=142.250.74.36:443 l7proto=unknown hostname='' desync profile 0 matches packet contains QUIC initial packet contains partial TLS ClientHello starting reassemble. now we have 1215/16384 DELAY desync until reasm is complete (#1) packet: id=109 drop packet: id=110 len=1278 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.36 proto=udp ttl=64 sport=57240 dport=443 UDP: len=1250 : C9 00 00 00 01 08 90 B6 61 B3 97 87 47 FC 00 00 44 D0 B9 A9 AA EF 3C 08 4C 21 90 50 CC D0 FB 3F ... : ........a...G...D.....<.L!.P...? ... using cached desync profile 0 packet contains QUIC initial reassemble : feeding data payload size=1215. now we have 2430/16384 packet contains full TLS ClientHello DELAY desync until reasm is complete (#2) REPLAYING delayed packet #1 offset 0 REPLAY IP4: 192.168.1.6 => 142.250.74.36 proto=udp ttl=64 sport=57240 dport=443 UDP: len=1250 : CF 00 00 00 01 08 90 B6 61 B3 97 87 47 FC 00 00 44 D0 08 08 AB 89 4E 23 53 80 36 E1 2B F9 19 29 ... : ........a...G...D.....N#S.6.+..) ... using cached desync profile 0 packet contains QUIC initial packet contains full TLS ClientHello hostname: www.google.com discovered l7 protocol discovered hostname desync profile search for udp target=142.250.74.36:443 l7proto=quic hostname='www.google.com' * hostlist check for profile 3 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtubeQ.txt] include hostlist check for www.google.com : negative hostlist check for google.com : negative hostlist check for com : negative * hostlist check for profile 8 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord.txt] include hostlist check for www.google.com : negative hostlist check for google.com : negative hostlist check for com : negative desync profile 0 matches dpi desync src=192.168.1.6:57240 dst=142.250.74.36:443 SENDING delayed packet #1 unmodified REPLAYING delayed packet #2 offset 1250 REPLAY IP4: 192.168.1.6 => 142.250.74.36 proto=udp ttl=64 sport=57240 dport=443 UDP: len=1250 : C9 00 00 00 01 08 90 B6 61 B3 97 87 47 FC 00 00 44 D0 B9 A9 AA EF 3C 08 4C 21 90 50 CC D0 FB 3F ... : ........a...G...D.....<.L!.P...? ... SENDING delayed packet #2 unmodified reassemble session finished packet: id=110 drop packet: id=111 len=52 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.36 proto=tcp ttl=64 sport=51393 dport=443 flags=S seq=1750455718 ack_seq=0 desync profile search for tcp target=142.250.74.36:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 142.250.74.36 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 142.250.74.36 : negative desync profile 10 matches Window size change 64240 => 1 Scale factor change 8 => 6 packet: id=111 reinject modified len=52 packet: id=112 len=1278 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.36 proto=udp ttl=64 sport=57240 dport=443 UDP: len=1250 : C5 00 00 00 01 08 F0 B6 61 B3 97 87 47 FC 00 00 44 D0 A2 E3 6F 68 4B 9B 9F 71 76 F8 B2 7A 67 59 ... : ........a...G...D...ohK..qv..zgY ... using cached desync profile 0 packet contains QUIC initial QUIC initial decryption failed. not applying tampering because desync_any_proto is not set packet: id=112 reinject unmodified packet: id=113 len=67 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.36 proto=udp ttl=64 sport=57240 dport=443 UDP: len=39 : E8 00 00 00 01 08 F0 B6 61 B3 97 87 47 FC 00 40 16 AA 38 04 90 8F 11 3E ED B3 38 E7 B7 6D 48 28 ... : ........a...G..@..8....>..8..mH( ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=113 reinject unmodified packet: id=114 len=52 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 142.250.74.36 => 192.168.1.6 proto=tcp ttl=57 sport=443 dport=51393 flags=SA seq=2620965091 ack_seq=1750455719 using cached desync profile 10 incoming TTL 57 packet: id=114 reinject unmodified packet: id=115 len=68 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.36 proto=udp ttl=64 sport=57240 dport=443 UDP: len=40 : E1 00 00 00 01 08 F0 B6 61 B3 97 87 47 FC 00 40 17 4A A8 51 20 A2 96 C1 44 2F F5 7D 2D ED DB 53 ... : ........a...G..@.J.Q ...D/.}-..S ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=115 reinject unmodified packet: id=116 len=1452 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.36 proto=tcp ttl=64 sport=51393 dport=443 flags=A seq=1750455719 ack_seq=2620965092 TCP: len=1412 : 16 03 01 06 F7 01 00 06 F3 03 03 2C 30 21 44 F8 F1 FE 83 00 C0 6E 27 59 EF 44 65 1E 28 B5 9F C0 ... : ...........,0!D......n'Y.De.(... ... using cached desync profile 10 Window size change 1025 => 1 packet contains partial TLS ClientHello starting reassemble. now we have 1412/1788 req retrans : seq interval 1750455719-1750457130 DELAY desync until reasm is complete (#1) packet: id=116 drop packet: id=117 len=416 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.36 proto=tcp ttl=64 sport=51393 dport=443 flags=AP seq=1750457131 ack_seq=2620965092 TCP: len=376 : 0C 00 0A 5A 5A 63 99 00 1D 00 17 00 18 00 2B 00 07 06 8A 8A 03 04 03 03 44 69 00 05 00 03 02 68 ... : ...ZZc........+.........Di.....h ... using cached desync profile 10 Window size change 1025 => 1 reassemble : feeding data payload size=376. now we have 1788/1788 packet contains full TLS ClientHello req retrans : seq interval 1750455719-1750457506 forced wssize-cutoff DELAY desync until reasm is complete (#2) REPLAYING delayed packet #1 offset 0 REPLAY IP4: 192.168.1.6 => 142.250.74.36 proto=tcp ttl=64 sport=51393 dport=443 flags=A seq=1750455719 ack_seq=2620965092 TCP: len=1412 : 16 03 01 06 F7 01 00 06 F3 03 03 2C 30 21 44 F8 F1 FE 83 00 C0 6E 27 59 EF 44 65 1E 28 B5 9F C0 ... : ...........,0!D......n'Y.De.(... ... using cached desync profile 10 packet contains full TLS ClientHello hostname: www.google.com discovered l7 protocol discovered hostname desync profile search for tcp target=142.250.74.36:443 l7proto=tls hostname='www.google.com' * hostlist check for profile 1 [C:\Users\ads\Desktop\YTDisBystroold\lists\netrogat.txt] include hostlist check for www.google.com : negative hostlist check for google.com : negative hostlist check for com : negative * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 142.250.74.36 : negative * hostlist check for profile 4 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube.txt] include hostlist check for www.google.com : negative hostlist check for google.com : negative hostlist check for com : negative * hostlist check for profile 6 [C:\Users\ads\Desktop\YTDisBystroold\lists\myhostlist.txt] include hostlist check for www.google.com : negative hostlist check for google.com : negative hostlist check for com : negative [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-blacklist.txt] include hostlist check for www.google.com : negative hostlist check for google.com : negative hostlist check for com : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 142.250.74.36 : negative desync profile 10 matches dpi desync src=192.168.1.6:51393 dst=142.250.74.36:443 regular split pos: 1775 regular split pos is outside of this packet seqovl : 1 SENDING delayed packet #1 unmodified REPLAYING delayed packet #2 offset 1412 REPLAY IP4: 192.168.1.6 => 142.250.74.36 proto=tcp ttl=64 sport=51393 dport=443 flags=AP seq=1750457131 ack_seq=2620965092 TCP: len=376 : 0C 00 0A 5A 5A 63 99 00 1D 00 17 00 18 00 2B 00 07 06 8A 8A 03 04 03 03 44 69 00 05 00 03 02 68 ... : ...ZZc........+.........Di.....h ... using cached desync profile 10 packet contains full TLS ClientHello hostname: www.google.com dpi desync src=192.168.1.6:51393 dst=142.250.74.36:443 regular split pos: 1775 normalized regular split pos : 363 seqovl : 1 sending fake(1) 1st tcp segment 0-362 len=363 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending 1st tcp segment 0-362 len=363 seqovl=1 : 00 0C 00 0A 5A 5A 63 99 00 1D 00 17 00 18 00 2B 00 07 06 8A 8A 03 04 03 03 44 69 00 05 00 03 02 ... : ....ZZc........+.........Di..... ... sending fake(2) 1st tcp segment 0-362 len=363 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending fake(1) 2nd tcp segment 363-375 len=13 : 00 00 00 00 00 00 00 00 00 00 00 00 00 : ............. sending 2nd tcp segment 363-375 len=13 : 6F 67 6C 65 2E 63 6F 6D 8A 8A 00 01 00 : ogle.com..... sending fake(2) 2nd tcp segment 363-375 len=13 : 00 00 00 00 00 00 00 00 00 00 00 00 00 : ............. DROPPING delayed packet #2 reassemble session finished packet: id=117 drop packet: id=118 len=117 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.36 proto=udp ttl=64 sport=57240 dport=443 UDP: len=89 : EE 00 00 00 01 08 F0 B6 61 B3 97 87 47 FC 00 40 48 1A AA A5 FE 40 2D 26 AD A2 23 88 CE 7F CB 9A ... : ........a...G..@H....@-&..#.... ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=118 reinject unmodified packet: id=119 len=100 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.36 proto=udp ttl=64 sport=57240 dport=443 UDP: len=72 : 46 F0 B6 61 B3 97 87 47 FC 41 BC 5F 84 50 05 F4 BD 34 7B B8 2B 5C F9 5B 79 96 F4 24 32 01 25 3A ... : F..a...G.A._.P...4{.+\.[y..$2.%: ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=119 reinject unmodified packet: id=120 len=1274 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.36 proto=udp ttl=64 sport=57240 dport=443 UDP: len=1246 : 57 F0 B6 61 B3 97 87 47 FC E5 A3 BD 83 93 80 24 98 15 E7 21 8E 2D 1C 1E A1 1C 83 D9 2E A1 80 1E ... : W..a...G.......$...!.-.......... ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=120 reinject unmodified packet: id=121 len=147 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.36 proto=udp ttl=64 sport=57240 dport=443 UDP: len=119 : 54 F0 B6 61 B3 97 87 47 FC 46 82 87 C9 6E AB 92 D2 3A 51 F8 CF E1 7E 26 1F 8F DB 23 B4 2A 03 F9 ... : T..a...G.F...n...:Q...~&...#.*.. ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=121 reinject unmodified packet: id=122 len=216 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.36 proto=udp ttl=64 sport=57240 dport=443 UDP: len=188 : 5F F0 B6 61 B3 97 87 47 FC 61 7A FC EA 56 52 0A 5E 68 DE 4B F8 9E 68 BD E2 9B 37 89 46 90 8D E0 ... : _..a...G.az..VR.^h.K..h...7.F... ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=122 reinject unmodified packet: id=123 len=115 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.36 proto=udp ttl=64 sport=57240 dport=443 UDP: len=87 : 5A F0 B6 61 B3 97 87 47 FC 63 0C 55 AE C6 D1 67 73 98 C8 7E 80 AE 2E FD FA 33 CB F8 85 1C 53 3F ... : Z..a...G.c.U...gs..~.....3....S? ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=123 reinject unmodified packet: id=124 len=197 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.36 proto=udp ttl=64 sport=57240 dport=443 UDP: len=169 : E7 00 00 00 01 08 F0 B6 61 B3 97 87 47 FC 00 40 49 99 1C B8 AE 7C EB 25 C8 3C E4 F7 38 A6 35 F5 ... : ........a...G..@I....|.%.<..8.5. ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=124 reinject unmodified packet: id=125 len=61 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.36 proto=udp ttl=64 sport=57240 dport=443 UDP: len=33 : 58 F0 B6 61 B3 97 87 47 FC F5 D1 59 78 AC 0E 11 71 88 8D 0A 3C 5D 17 56 15 67 47 26 90 6B 88 77 ... : X..a...G...Yx...q...<].V.gG&.k.w ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=125 reinject unmodified packet: id=126 len=61 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.36 proto=udp ttl=64 sport=57240 dport=443 UDP: len=33 : 49 F0 B6 61 B3 97 87 47 FC DB 7B 8F 62 A4 13 D3 63 ED A8 52 79 8A B1 5D A2 56 A9 A6 0E 45 DF 9C ... : I..a...G..{.b...c..Ry..].V...E.. ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=126 reinject unmodified packet: id=127 len=59 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.36 proto=udp ttl=64 sport=57240 dport=443 UDP: len=31 : 4B F0 B6 61 B3 97 87 47 FC 4B 16 74 1F 47 91 6F 45 E7 6B 8A 15 70 60 E9 5C 72 2C 29 DE 83 35 : K..a...G.K.t.G.oE.k..p`.\r,)..5 using cached desync profile 0 not applying tampering to unknown protocol packet: id=127 reinject unmodified packet: id=128 len=63 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.36 proto=udp ttl=64 sport=57240 dport=443 UDP: len=35 : 4C F0 B6 61 B3 97 87 47 FC E8 4A 10 21 32 48 AB 8D BB 2E FF FC B9 CA B6 92 D5 9B 81 DB CA D7 56 ... : L..a...G..J.!2H................V ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=128 reinject unmodified packet: id=129 len=63 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.36 proto=udp ttl=64 sport=57240 dport=443 UDP: len=35 : 5E F0 B6 61 B3 97 87 47 FC E6 E8 46 5C 54 E1 A5 A4 87 E9 86 B0 E0 67 A0 F5 0E F1 F5 CB B7 AD 17 ... : ^..a...G...F\T........g......... ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=129 reinject unmodified packet: id=130 len=63 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.36 proto=udp ttl=64 sport=57240 dport=443 UDP: len=35 : 42 F0 B6 61 B3 97 87 47 FC B2 C8 A5 09 DB 08 02 CA 06 91 43 BF D4 07 B2 D9 99 20 33 03 00 6F 1B ... : B..a...G...........C...... 3..o. ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=130 reinject unmodified packet: id=131 len=59 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.36 proto=udp ttl=64 sport=57240 dport=443 UDP: len=31 : 51 F0 B6 61 B3 97 87 47 FC 42 E0 DE D8 B5 21 08 F4 0D DE C0 BF 6A 73 3C 0A D2 7A B1 FC 85 DB : Q..a...G.B....!......js<..z.... using cached desync profile 0 not applying tampering to unknown protocol packet: id=131 reinject unmodified packet: id=132 len=59 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.36 proto=udp ttl=64 sport=57240 dport=443 UDP: len=31 : 4E F0 B6 61 B3 97 87 47 FC 2A 0F A1 6C C5 07 B5 57 A4 5B C4 33 D9 8A 9B C4 1C 9F 77 71 0C 08 : N..a...G.*..l...W.[.3......wq.. using cached desync profile 0 not applying tampering to unknown protocol packet: id=132 reinject unmodified packet: id=133 len=59 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.36 proto=udp ttl=64 sport=57240 dport=443 UDP: len=31 : 5B F0 B6 61 B3 97 87 47 FC BD 98 36 C4 E7 B2 AE 7A 56 29 36 B5 6E AD 49 49 2A 48 61 43 73 6D : [..a...G...6....zV)6.n.II*HaCsm using cached desync profile 0 not applying tampering to unknown protocol packet: id=133 reinject unmodified packet: id=134 len=59 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.36 proto=udp ttl=64 sport=57240 dport=443 UDP: len=31 : 53 F0 B6 61 B3 97 87 47 FC B8 32 09 37 3C 30 B4 BC 0C 9E C6 EB B2 38 B9 75 7C C6 8B 50 17 AF : S..a...G..2.7<0.......8.u|..P.. using cached desync profile 0 not applying tampering to unknown protocol packet: id=134 reinject unmodified packet: id=135 len=59 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.36 proto=udp ttl=64 sport=57240 dport=443 UDP: len=31 : 41 F0 B6 61 B3 97 87 47 FC 30 0E 73 E5 E7 DA B4 1C BC 20 43 F2 8B D1 72 23 62 9B EC 14 A8 7A : A..a...G.0.s...... C...r#b....z using cached desync profile 0 not applying tampering to unknown protocol packet: id=135 reinject unmodified packet: id=136 len=59 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.36 proto=udp ttl=64 sport=57240 dport=443 UDP: len=31 : 44 F0 B6 61 B3 97 87 47 FC 44 9F 5F AD C3 D9 B1 3D 06 22 D0 87 B2 99 BB 38 2B 56 61 3C C5 38 : D..a...G.D._....=.".....8+Va<.8 using cached desync profile 0 not applying tampering to unknown protocol packet: id=136 reinject unmodified packet: id=137 len=59 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.36 proto=udp ttl=64 sport=57240 dport=443 UDP: len=31 : 4C F0 B6 61 B3 97 87 47 FC 71 6F 92 07 A3 43 28 85 0D 21 93 E9 23 E2 FB 03 38 9F B2 6A 31 A9 : L..a...G.qo...C(..!..#...8..j1. using cached desync profile 0 not applying tampering to unknown protocol packet: id=137 reinject unmodified packet: id=138 len=59 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.36 proto=udp ttl=64 sport=57240 dport=443 UDP: len=31 : 4A F0 B6 61 B3 97 87 47 FC 55 66 E7 00 BA 28 9A E8 DB BB F5 7B 83 1A 58 04 CD C2 63 A8 D2 F7 : J..a...G.Uf...(.....{..X...c... using cached desync profile 0 not applying tampering to unknown protocol packet: id=138 reinject unmodified packet: id=139 len=59 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.36 proto=udp ttl=64 sport=57240 dport=443 UDP: len=31 : 4A F0 B6 61 B3 97 87 47 FC AE 6E 81 AE 07 46 79 19 30 3F 71 89 D9 5D 5A D6 52 D6 5A A4 FC 2C : J..a...G..n...Fy.0?q..]Z.R.Z.., using cached desync profile 0 not applying tampering to unknown protocol packet: id=139 reinject unmodified packet: id=140 len=59 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.36 proto=udp ttl=64 sport=57240 dport=443 UDP: len=31 : 4F F0 B6 61 B3 97 87 47 FC E9 C4 F9 59 35 A7 83 52 C6 8F 71 56 51 9F C9 EE 67 29 A1 58 25 69 : O..a...G....Y5..R..qVQ...g).X%i using cached desync profile 0 not applying tampering to unknown protocol packet: id=140 reinject unmodified packet: id=141 len=59 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.36 proto=udp ttl=64 sport=57240 dport=443 UDP: len=31 : 46 F0 B6 61 B3 97 87 47 FC CF 2B 44 04 FD 2D 18 61 A5 79 91 6C 35 55 7D 6A 71 80 15 3D 71 6B : F..a...G..+D..-.a.y.l5U}jq..=qk using cached desync profile 0 not applying tampering to unknown protocol packet: id=141 reinject unmodified packet: id=142 len=59 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.36 proto=udp ttl=64 sport=57240 dport=443 UDP: len=31 : 4B F0 B6 61 B3 97 87 47 FC BA 0C 8F 7E BC A3 5A 9B 2F CD 70 EB 33 56 2B 18 CF C9 41 D4 FF 52 : K..a...G....~..Z./.p.3V+...A..R using cached desync profile 0 not applying tampering to unknown protocol packet: id=142 reinject unmodified packet: id=143 len=59 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.36 proto=udp ttl=64 sport=57240 dport=443 UDP: len=31 : 53 F0 B6 61 B3 97 87 47 FC 73 AD EC 74 13 F6 78 FC 24 B5 23 F8 81 67 9B D4 42 D0 9D E1 77 7F : S..a...G.s..t..x.$.#..g..B...w using cached desync profile 0 not applying tampering to unknown protocol packet: id=143 reinject unmodified packet: id=144 len=59 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.36 proto=udp ttl=64 sport=57240 dport=443 UDP: len=31 : 48 F0 B6 61 B3 97 87 47 FC F4 59 99 CF 3E 1F 43 09 05 5B 5C 23 B7 5A 48 82 DE 48 59 46 72 3E : H..a...G..Y..>.C..[\#.ZH..HYFr> using cached desync profile 0 not applying tampering to unknown protocol packet: id=144 reinject unmodified packet: id=145 len=59 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.36 proto=udp ttl=64 sport=57240 dport=443 UDP: len=31 : 4D F0 B6 61 B3 97 87 47 FC E4 B7 01 FA A5 D0 1B CE 8B 5C AE 3C 06 28 87 4B 88 F0 9C 27 83 00 : M..a...G..........\.<.(.K...'.. using cached desync profile 0 not applying tampering to unknown protocol packet: id=145 reinject unmodified packet: id=146 len=52 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=tcp ttl=64 sport=51394 dport=443 flags=S seq=2953446789 ack_seq=0 desync profile search for tcp target=74.125.131.100:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 74.125.131.100 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 74.125.131.100 : negative desync profile 10 matches Window size change 64240 => 1 Scale factor change 8 => 6 packet: id=146 reinject modified len=52 packet: id=147 len=52 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.73.95 proto=tcp ttl=64 sport=51395 dport=443 flags=S seq=2710833488 ack_seq=0 desync profile search for tcp target=173.194.73.95:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 173.194.73.95 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 173.194.73.95 : negative desync profile 10 matches Window size change 64240 => 1 Scale factor change 8 => 6 packet: id=147 reinject modified len=52 packet: id=148 len=52 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 74.125.131.100 => 192.168.1.6 proto=tcp ttl=120 sport=443 dport=51394 flags=SA seq=2293263684 ack_seq=2953446790 using cached desync profile 10 incoming TTL 120 packet: id=148 reinject unmodified packet: id=149 len=1452 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=tcp ttl=64 sport=51394 dport=443 flags=A seq=2953446790 ack_seq=2293263685 TCP: len=1412 : 16 03 01 06 D7 01 00 06 D3 03 03 64 E1 18 30 C4 07 28 34 D4 7F 55 96 FB C7 15 FB AC 1A 90 45 76 ... : ...........d..0..(4.U........Ev ... using cached desync profile 10 Window size change 1025 => 1 packet contains partial TLS ClientHello starting reassemble. now we have 1412/1756 req retrans : seq interval 2953446790-2953448201 DELAY desync until reasm is complete (#1) packet: id=149 drop packet: id=150 len=384 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=tcp ttl=64 sport=51394 dport=443 flags=AP seq=2953448202 ack_seq=2293263685 TCP: len=344 : 00 0B 00 02 01 00 00 12 00 00 00 0A 00 0C 00 0A AA AA 63 99 00 1D 00 17 00 18 FE 0D 00 DA 00 00 ... : ..................c............. ... using cached desync profile 10 Window size change 1025 => 1 reassemble : feeding data payload size=344. now we have 1756/1756 packet contains full TLS ClientHello req retrans : seq interval 2953446790-2953448545 forced wssize-cutoff DELAY desync until reasm is complete (#2) REPLAYING delayed packet #1 offset 0 REPLAY IP4: 192.168.1.6 => 74.125.131.100 proto=tcp ttl=64 sport=51394 dport=443 flags=A seq=2953446790 ack_seq=2293263685 TCP: len=1412 : 16 03 01 06 D7 01 00 06 D3 03 03 64 E1 18 30 C4 07 28 34 D4 7F 55 96 FB C7 15 FB AC 1A 90 45 76 ... : ...........d..0..(4.U........Ev ... using cached desync profile 10 packet contains full TLS ClientHello hostname: lh3.google.com discovered l7 protocol discovered hostname desync profile search for tcp target=74.125.131.100:443 l7proto=tls hostname='lh3.google.com' * hostlist check for profile 1 [C:\Users\ads\Desktop\YTDisBystroold\lists\netrogat.txt] include hostlist check for lh3.google.com : negative hostlist check for google.com : negative hostlist check for com : negative * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 74.125.131.100 : negative * hostlist check for profile 4 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube.txt] include hostlist check for lh3.google.com : negative hostlist check for google.com : negative hostlist check for com : negative * hostlist check for profile 6 [C:\Users\ads\Desktop\YTDisBystroold\lists\myhostlist.txt] include hostlist check for lh3.google.com : negative hostlist check for google.com : negative hostlist check for com : negative [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-blacklist.txt] include hostlist check for lh3.google.com : negative hostlist check for google.com : negative hostlist check for com : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 74.125.131.100 : negative desync profile 10 matches dpi desync src=192.168.1.6:51394 dst=74.125.131.100:443 regular split pos: 1743 regular split pos is outside of this packet seqovl : 1 SENDING delayed packet #1 unmodified REPLAYING delayed packet #2 offset 1412 REPLAY IP4: 192.168.1.6 => 74.125.131.100 proto=tcp ttl=64 sport=51394 dport=443 flags=AP seq=2953448202 ack_seq=2293263685 TCP: len=344 : 00 0B 00 02 01 00 00 12 00 00 00 0A 00 0C 00 0A AA AA 63 99 00 1D 00 17 00 18 FE 0D 00 DA 00 00 ... : ..................c............. ... using cached desync profile 10 packet contains full TLS ClientHello hostname: lh3.google.com dpi desync src=192.168.1.6:51394 dst=74.125.131.100:443 regular split pos: 1743 normalized regular split pos : 331 seqovl : 1 sending fake(1) 1st tcp segment 0-330 len=331 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending 1st tcp segment 0-330 len=331 seqovl=1 : 00 00 0B 00 02 01 00 00 12 00 00 00 0A 00 0C 00 0A AA AA 63 99 00 1D 00 17 00 18 FE 0D 00 DA 00 ... : ...................c............ ... sending fake(2) 1st tcp segment 0-330 len=331 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending fake(1) 2nd tcp segment 331-343 len=13 : 00 00 00 00 00 00 00 00 00 00 00 00 00 : ............. sending 2nd tcp segment 331-343 len=13 : 6F 67 6C 65 2E 63 6F 6D EA EA 00 01 00 : ogle.com..... sending fake(2) 2nd tcp segment 331-343 len=13 : 00 00 00 00 00 00 00 00 00 00 00 00 00 : ............. DROPPING delayed packet #2 reassemble session finished packet: id=150 drop packet: id=151 len=52 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 173.194.73.95 => 192.168.1.6 proto=tcp ttl=120 sport=443 dport=51395 flags=SA seq=719541791 ack_seq=2710833489 using cached desync profile 10 incoming TTL 120 packet: id=151 reinject unmodified packet: id=152 len=114 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 142.250.74.36 proto=tcp ttl=64 sport=51393 dport=443 flags=AP seq=1750457507 ack_seq=2620970443 TCP: len=74 : 14 03 03 00 01 01 17 03 03 00 3F C1 39 A2 57 3E A2 83 73 B2 22 9F 75 1C 17 F2 2D 7C 43 46 46 17 ... : ..........?.9.W>..s.".u...-|CFF. ... using cached desync profile 10 wssize-cutoff reached (mode n): 4/0 . not changing wssize. not applying tampering to unknown protocol packet: id=152 reinject unmodified packet: id=153 len=1452 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.73.95 proto=tcp ttl=64 sport=51395 dport=443 flags=A seq=2710833489 ack_seq=719541792 TCP: len=1412 : 16 03 01 07 25 01 00 07 21 03 03 A2 F5 E5 11 89 B7 88 AF 7B A4 5A 6E AD 10 22 B7 97 E3 46 87 B4 ... : ....%...!..........{.Zn.."...F.. ... using cached desync profile 10 Window size change 1025 => 1 packet contains partial TLS ClientHello starting reassemble. now we have 1412/1834 req retrans : seq interval 2710833489-2710834900 DELAY desync until reasm is complete (#1) packet: id=153 drop packet: id=154 len=462 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.73.95 proto=tcp ttl=64 sport=51395 dport=443 flags=AP seq=2710834901 ack_seq=719541792 TCP: len=422 : 5B CC 92 68 B0 7B A8 79 D9 7D 00 BF 52 8F 84 E7 00 1D 00 20 7E A6 EA 8B E7 F7 12 94 05 7E 66 C6 ... : [..h.{.y.}..R...... ~........~f. ... using cached desync profile 10 Window size change 1025 => 1 reassemble : feeding data payload size=422. now we have 1834/1834 packet contains full TLS ClientHello req retrans : seq interval 2710833489-2710835322 forced wssize-cutoff DELAY desync until reasm is complete (#2) REPLAYING delayed packet #1 offset 0 REPLAY IP4: 192.168.1.6 => 173.194.73.95 proto=tcp ttl=64 sport=51395 dport=443 flags=A seq=2710833489 ack_seq=719541792 TCP: len=1412 : 16 03 01 07 25 01 00 07 21 03 03 A2 F5 E5 11 89 B7 88 AF 7B A4 5A 6E AD 10 22 B7 97 E3 46 87 B4 ... : ....%...!..........{.Zn.."...F.. ... using cached desync profile 10 packet contains full TLS ClientHello hostname: ogads-pa.clients6.google.com discovered l7 protocol discovered hostname desync profile search for tcp target=173.194.73.95:443 l7proto=tls hostname='ogads-pa.clients6.google.com' * hostlist check for profile 1 [C:\Users\ads\Desktop\YTDisBystroold\lists\netrogat.txt] include hostlist check for ogads-pa.clients6.google.com : negative hostlist check for clients6.google.com : negative hostlist check for google.com : negative hostlist check for com : negative * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 173.194.73.95 : negative * hostlist check for profile 4 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube.txt] include hostlist check for ogads-pa.clients6.google.com : negative hostlist check for clients6.google.com : negative hostlist check for google.com : negative hostlist check for com : negative * hostlist check for profile 6 [C:\Users\ads\Desktop\YTDisBystroold\lists\myhostlist.txt] include hostlist check for ogads-pa.clients6.google.com : negative hostlist check for clients6.google.com : negative hostlist check for google.com : negative hostlist check for com : negative [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-blacklist.txt] include hostlist check for ogads-pa.clients6.google.com : negative hostlist check for clients6.google.com : negative hostlist check for google.com : negative hostlist check for com : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 173.194.73.95 : negative desync profile 10 matches dpi desync src=192.168.1.6:51395 dst=173.194.73.95:443 regular split pos: 147 normalized regular split pos : 147 seqovl : 1 sending fake(1) 1st tcp segment 0-146 len=147 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending 1st tcp segment 0-146 len=147 seqovl=1 : 00 16 03 01 07 25 01 00 07 21 03 03 A2 F5 E5 11 89 B7 88 AF 7B A4 5A 6E AD 10 22 B7 97 E3 46 87 ... : .....%...!..........{.Zn.."...F. ... sending fake(2) 1st tcp segment 0-146 len=147 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending fake(1) 2nd tcp segment 147-1411 len=1265 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending 2nd tcp segment 147-1411 len=1265 : 6F 67 6C 65 2E 63 6F 6D FF 01 00 01 00 00 0D 00 12 00 10 04 03 08 04 04 01 05 03 08 05 05 01 08 ... : ogle.com........................ ... sending fake(2) 2nd tcp segment 147-1411 len=1265 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... DROPPING delayed packet #1 REPLAYING delayed packet #2 offset 1412 REPLAY IP4: 192.168.1.6 => 173.194.73.95 proto=tcp ttl=64 sport=51395 dport=443 flags=AP seq=2710834901 ack_seq=719541792 TCP: len=422 : 5B CC 92 68 B0 7B A8 79 D9 7D 00 BF 52 8F 84 E7 00 1D 00 20 7E A6 EA 8B E7 F7 12 94 05 7E 66 C6 ... : [..h.{.y.}..R...... ~........~f. ... using cached desync profile 10 packet contains full TLS ClientHello hostname: ogads-pa.clients6.google.com dpi desync src=192.168.1.6:51395 dst=173.194.73.95:443 regular split pos: 147 regular split pos is outside of this packet seqovl : 1 SENDING delayed packet #2 unmodified reassemble session finished packet: id=154 drop packet: id=155 len=114 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=tcp ttl=64 sport=51394 dport=443 flags=AP seq=2953448546 ack_seq=2293271520 TCP: len=74 : 14 03 03 00 01 01 17 03 03 00 3F 97 EB D0 29 5C 45 25 C1 DD BE 97 CA 79 9C 17 75 29 07 D1 0E 76 ... : ..........?...)\E%.....y..u)...v ... using cached desync profile 10 wssize-cutoff reached (mode n): 4/0 . not changing wssize. not applying tampering to unknown protocol packet: id=155 reinject unmodified packet: id=156 len=132 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=tcp ttl=64 sport=51394 dport=443 flags=AP seq=2953448620 ack_seq=2293271520 TCP: len=92 : 17 03 03 00 57 9C DF 65 84 34 41 65 67 9F BD CF A7 58 D2 CE D9 31 D7 86 6C E4 6E 7C 5D 20 22 79 ... : ....W..e.4Aeg....X...1..l.n|] "y ... using cached desync profile 10 wssize-cutoff reached (mode n): 5/0 . not changing wssize. not applying tampering to unknown protocol packet: id=156 reinject unmodified packet: id=157 len=1452 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=tcp ttl=64 sport=51394 dport=443 flags=A seq=2953448712 ack_seq=2293271520 TCP: len=1412 : 17 03 03 09 CF 99 41 B3 B9 7E B6 82 8D B7 69 D6 E0 3C 8C 2D 07 54 21 20 41 AF 2D 91 86 02 3B 7F ... : ......A..~....i..<.-.T! A.-...; ... using cached desync profile 10 wssize-cutoff reached (mode n): 6/0 . not changing wssize. not applying tampering to unknown protocol packet: id=157 reinject unmodified packet: id=158 len=1144 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=tcp ttl=64 sport=51394 dport=443 flags=AP seq=2953450124 ack_seq=2293271520 TCP: len=1104 : 53 80 F6 F1 D1 7F E0 7A 13 2E 64 00 D1 86 21 C0 3B 68 F5 C5 BA 26 74 D3 C0 92 92 49 38 3D 00 3D ... : S.....z..d...!.;h...&t....I8=.= ... using cached desync profile 10 wssize-cutoff reached (mode n): 7/0 . not changing wssize. not applying tampering to unknown protocol packet: id=158 reinject unmodified packet: id=159 len=71 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=tcp ttl=64 sport=51394 dport=443 flags=AP seq=2953451228 ack_seq=2293272478 TCP: len=31 : 17 03 03 00 1A A7 29 E2 F7 E6 51 13 A0 B1 B4 EF BC 61 C3 C3 87 D0 4E BE 98 A8 74 9A 57 11 66 : ......)...Q......a....N...t.W.f using cached desync profile 10 wssize-cutoff reached (mode n): 8/0 . not changing wssize. not applying tampering to unknown protocol packet: id=159 reinject unmodified packet: id=160 len=75 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=tcp ttl=64 sport=51394 dport=443 flags=AP seq=2953451259 ack_seq=2293273882 TCP: len=35 : 17 03 03 00 1E 38 43 11 EB 09 74 F8 C1 AD 16 0E 65 16 3C 8B AB 97 1D 11 C6 A0 4E 9E 98 11 B5 59 ... : .....8C...t.....e.<.......N....Y ... using cached desync profile 10 wssize-cutoff reached (mode n): 9/0 . not changing wssize. not applying tampering to unknown protocol packet: id=160 reinject unmodified packet: id=161 len=79 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=tcp ttl=64 sport=51394 dport=443 flags=AP seq=2953451294 ack_seq=2293275617 TCP: len=39 : 17 03 03 00 22 B2 55 E8 6F C7 9A 14 52 7D 3F 72 7E 09 09 18 DD E4 83 5C 1C AE B4 F9 EC DE 6E 3B ... : ....".U.o...R}?r~......\......n; ... using cached desync profile 10 wssize-cutoff reached (mode n): 10/0 . not changing wssize. not applying tampering to unknown protocol packet: id=161 reinject unmodified packet: id=162 len=52 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.132 proto=tcp ttl=64 sport=51396 dport=443 flags=S seq=4124156052 ack_seq=0 desync profile search for tcp target=64.233.165.132:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 64.233.165.132 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 64.233.165.132 : negative desync profile 10 matches Window size change 64240 => 1 Scale factor change 8 => 6 packet: id=162 reinject modified len=52 packet: id=163 len=114 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.73.95 proto=tcp ttl=64 sport=51395 dport=443 flags=AP seq=2710835323 ack_seq=719552685 TCP: len=74 : 14 03 03 00 01 01 17 03 03 00 3F 02 70 93 C4 BF DB 2F 8D 30 EF F0 B1 AA 95 9A 1D E6 63 B4 B1 88 ... : ..........?.p..../.0........c... ... using cached desync profile 10 wssize-cutoff reached (mode n): 4/0 . not changing wssize. not applying tampering to unknown protocol packet: id=163 reinject unmodified packet: id=164 len=132 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.73.95 proto=tcp ttl=64 sport=51395 dport=443 flags=AP seq=2710835397 ack_seq=719552685 TCP: len=92 : 17 03 03 00 57 20 BC 3A 4F CF D7 C9 94 F7 54 61 D7 74 B7 17 FD EA 24 F5 21 55 F8 75 7E C0 34 FA ... : ....W .:O.....Ta.t....$.!U.u~.4. ... using cached desync profile 10 wssize-cutoff reached (mode n): 5/0 . not changing wssize. not applying tampering to unknown protocol packet: id=164 reinject unmodified packet: id=165 len=504 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.73.95 proto=tcp ttl=64 sport=51395 dport=443 flags=AP seq=2710835489 ack_seq=719552685 TCP: len=464 : 17 03 03 01 CB 86 1B 85 8F 20 C0 C3 80 47 0A 5B D4 7C B6 86 49 A5 01 65 8D 82 5F 6A C7 50 58 4F ... : ......... ...G.[.|..I..e.._j.PXO ... using cached desync profile 10 wssize-cutoff reached (mode n): 6/0 . not changing wssize. not applying tampering to unknown protocol packet: id=165 reinject unmodified packet: id=166 len=52 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 64.233.165.132 => 192.168.1.6 proto=tcp ttl=120 sport=443 dport=51396 flags=SA seq=3909152680 ack_seq=4124156053 using cached desync profile 10 incoming TTL 120 packet: id=166 reinject unmodified packet: id=167 len=1452 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.132 proto=tcp ttl=64 sport=51396 dport=443 flags=A seq=4124156053 ack_seq=3909152681 TCP: len=1412 : 16 03 01 06 E2 01 00 06 DE 03 03 DB 30 28 BF 8D 4E E2 60 43 46 4F 4D 6C 26 7C 57 25 02 D6 8B 8D ... : ............0(..N.`CFOMl&|W%.... ... using cached desync profile 10 Window size change 1025 => 1 packet contains partial TLS ClientHello starting reassemble. now we have 1412/1767 req retrans : seq interval 4124156053-4124157464 DELAY desync until reasm is complete (#1) packet: id=167 drop packet: id=168 len=395 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.132 proto=tcp ttl=64 sport=51396 dport=443 flags=AP seq=4124157465 ack_seq=3909152681 TCP: len=355 : 1B 40 44 7D 7C 87 2B 9F C1 43 5D E1 B0 BE 95 8F 02 49 72 51 00 5D 41 86 46 2D F8 2E C2 4A 5A 8A ... : .@D}|.+..C]......IrQ.]A.F-...JZ. ... using cached desync profile 10 Window size change 1025 => 1 reassemble : feeding data payload size=355. now we have 1767/1767 packet contains full TLS ClientHello req retrans : seq interval 4124156053-4124157819 forced wssize-cutoff DELAY desync until reasm is complete (#2) REPLAYING delayed packet #1 offset 0 REPLAY IP4: 192.168.1.6 => 64.233.165.132 proto=tcp ttl=64 sport=51396 dport=443 flags=A seq=4124156053 ack_seq=3909152681 TCP: len=1412 : 16 03 01 06 E2 01 00 06 DE 03 03 DB 30 28 BF 8D 4E E2 60 43 46 4F 4D 6C 26 7C 57 25 02 D6 8B 8D ... : ............0(..N.`CFOMl&|W%.... ... using cached desync profile 10 packet contains full TLS ClientHello hostname: lh3.googleusercontent.com discovered l7 protocol discovered hostname desync profile search for tcp target=64.233.165.132:443 l7proto=tls hostname='lh3.googleusercontent.com' * hostlist check for profile 1 [C:\Users\ads\Desktop\YTDisBystroold\lists\netrogat.txt] include hostlist check for lh3.googleusercontent.com : negative hostlist check for googleusercontent.com : negative hostlist check for com : negative * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 64.233.165.132 : negative * hostlist check for profile 4 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube.txt] include hostlist check for lh3.googleusercontent.com : negative hostlist check for googleusercontent.com : negative hostlist check for com : negative * hostlist check for profile 6 [C:\Users\ads\Desktop\YTDisBystroold\lists\myhostlist.txt] include hostlist check for lh3.googleusercontent.com : negative hostlist check for googleusercontent.com : negative hostlist check for com : negative [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-blacklist.txt] include hostlist check for lh3.googleusercontent.com : negative hostlist check for googleusercontent.com : negative hostlist check for com : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 64.233.165.132 : negative desync profile 10 matches dpi desync src=192.168.1.6:51396 dst=64.233.165.132:443 regular split pos: 371 normalized regular split pos : 371 seqovl : 1 sending fake(1) 1st tcp segment 0-370 len=371 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending 1st tcp segment 0-370 len=371 seqovl=1 : 00 16 03 01 06 E2 01 00 06 DE 03 03 DB 30 28 BF 8D 4E E2 60 43 46 4F 4D 6C 26 7C 57 25 02 D6 8B ... : .............0(..N.`CFOMl&|W%... ... sending fake(2) 1st tcp segment 0-370 len=371 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending fake(1) 2nd tcp segment 371-1411 len=1041 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending 2nd tcp segment 371-1411 len=1041 : 73 65 72 63 6F 6E 74 65 6E 74 2E 63 6F 6D 00 10 00 0E 00 0C 02 68 32 08 68 74 74 70 2F 31 2E 31 ... : sercontent.com.......h2.http/1.1 ... sending fake(2) 2nd tcp segment 371-1411 len=1041 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... DROPPING delayed packet #1 REPLAYING delayed packet #2 offset 1412 REPLAY IP4: 192.168.1.6 => 64.233.165.132 proto=tcp ttl=64 sport=51396 dport=443 flags=AP seq=4124157465 ack_seq=3909152681 TCP: len=355 : 1B 40 44 7D 7C 87 2B 9F C1 43 5D E1 B0 BE 95 8F 02 49 72 51 00 5D 41 86 46 2D F8 2E C2 4A 5A 8A ... : .@D}|.+..C]......IrQ.]A.F-...JZ. ... using cached desync profile 10 packet contains full TLS ClientHello hostname: lh3.googleusercontent.com dpi desync src=192.168.1.6:51396 dst=64.233.165.132:443 regular split pos: 371 regular split pos is outside of this packet seqovl : 1 SENDING delayed packet #2 unmodified reassemble session finished packet: id=168 drop packet: id=169 len=71 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.73.95 proto=tcp ttl=64 sport=51395 dport=443 flags=AP seq=2710835953 ack_seq=719553671 TCP: len=31 : 17 03 03 00 1A CB E8 8D 76 99 00 92 09 86 15 9D 39 B5 5F 26 3D E0 A2 DF A6 71 7B 6F FC 5A C4 : ........v.......9._&=....q{o.Z. using cached desync profile 10 wssize-cutoff reached (mode n): 7/0 . not changing wssize. not applying tampering to unknown protocol packet: id=169 reinject unmodified packet: id=170 len=79 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.73.95 proto=tcp ttl=64 sport=51395 dport=443 flags=AP seq=2710835984 ack_seq=719554184 TCP: len=39 : 17 03 03 00 22 A6 61 FB 15 79 00 4B A0 78 B7 57 79 45 F0 6B 08 45 59 EB 58 2D CE 47 AA DB 86 FD ... : ....".a..y.K.x.WyE.k.EY.X-.G.... ... using cached desync profile 10 wssize-cutoff reached (mode n): 8/0 . not changing wssize. not applying tampering to unknown protocol packet: id=170 reinject unmodified packet: id=171 len=1278 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.73.95 proto=udp ttl=64 sport=55839 dport=443 UDP: len=1250 : C7 00 00 00 01 08 DF 21 9F E9 C7 AC 77 AC 00 00 44 D0 94 A7 4B 77 8A E4 3B 62 96 2F 2E 53 38 F2 ... : .......!....w...D...Kw..;b./.S8. ... desync profile search for udp target=173.194.73.95:443 l7proto=unknown hostname='' desync profile 0 matches packet contains QUIC initial packet contains partial TLS ClientHello starting reassemble. now we have 1215/16384 DELAY desync until reasm is complete (#1) packet: id=171 drop packet: id=172 len=1278 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.73.95 proto=udp ttl=64 sport=55839 dport=443 UDP: len=1250 : C7 00 00 00 01 08 DF 21 9F E9 C7 AC 77 AC 00 00 44 D0 00 DB D6 0A 8F B7 D4 42 CE 97 14 30 F6 2E ... : .......!....w...D........B...0.. ... using cached desync profile 0 packet contains QUIC initial reassemble : feeding data payload size=1215. now we have 2430/16384 packet contains full TLS ClientHello DELAY desync until reasm is complete (#2) REPLAYING delayed packet #1 offset 0 REPLAY IP4: 192.168.1.6 => 173.194.73.95 proto=udp ttl=64 sport=55839 dport=443 UDP: len=1250 : C7 00 00 00 01 08 DF 21 9F E9 C7 AC 77 AC 00 00 44 D0 94 A7 4B 77 8A E4 3B 62 96 2F 2E 53 38 F2 ... : .......!....w...D...Kw..;b./.S8. ... using cached desync profile 0 packet contains QUIC initial packet contains full TLS ClientHello hostname: ogads-pa.clients6.google.com discovered l7 protocol discovered hostname desync profile search for udp target=173.194.73.95:443 l7proto=quic hostname='ogads-pa.clients6.google.com' * hostlist check for profile 3 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtubeQ.txt] include hostlist check for ogads-pa.clients6.google.com : negative hostlist check for clients6.google.com : negative hostlist check for google.com : negative hostlist check for com : negative * hostlist check for profile 8 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord.txt] include hostlist check for ogads-pa.clients6.google.com : negative hostlist check for clients6.google.com : negative hostlist check for google.com : negative hostlist check for com : negative desync profile 0 matches dpi desync src=192.168.1.6:55839 dst=173.194.73.95:443 SENDING delayed packet #1 unmodified REPLAYING delayed packet #2 offset 1250 REPLAY IP4: 192.168.1.6 => 173.194.73.95 proto=udp ttl=64 sport=55839 dport=443 UDP: len=1250 : C7 00 00 00 01 08 DF 21 9F E9 C7 AC 77 AC 00 00 44 D0 00 DB D6 0A 8F B7 D4 42 CE 97 14 30 F6 2E ... : .......!....w...D........B...0.. ... SENDING delayed packet #2 unmodified reassemble session finished packet: id=172 drop packet: id=173 len=52 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.73.95 proto=tcp ttl=64 sport=51397 dport=443 flags=S seq=2782453214 ack_seq=0 desync profile search for tcp target=173.194.73.95:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 173.194.73.95 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 173.194.73.95 : negative desync profile 10 matches Window size change 64240 => 1 Scale factor change 8 => 6 packet: id=173 reinject modified len=52 packet: id=174 len=1278 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.73.95 proto=udp ttl=64 sport=55839 dport=443 UDP: len=1250 : C4 00 00 00 01 08 DF 21 9F E9 C7 AC 77 AC 00 00 44 D0 33 8D ED 5D 43 68 3E 65 E2 09 6C C4 18 0F ... : .......!....w...D.3..]Ch>e..l... ... using cached desync profile 0 packet contains QUIC initial packet contains partial TLS ClientHello starting reassemble. now we have 1215/16384 DELAY desync until reasm is complete (#1) packet: id=174 drop packet: id=175 len=52 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.198 proto=tcp ttl=64 sport=51398 dport=443 flags=S seq=4065935969 ack_seq=0 desync profile search for tcp target=64.233.165.198:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 64.233.165.198 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 64.233.165.198 : negative desync profile 10 matches Window size change 64240 => 1 Scale factor change 8 => 6 packet: id=175 reinject modified len=52 packet: id=176 len=1278 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.73.95 proto=udp ttl=64 sport=55839 dport=443 UDP: len=1250 : CF 00 00 00 01 08 FF 21 9F E9 C7 AC 77 AC 00 00 44 D0 F3 97 D1 89 E1 85 9B F7 50 A1 8D 87 59 CF ... : .......!....w...D.........P...Y. ... using cached desync profile 0 packet contains QUIC initial reassemble session cancelled SENDING 1 delayed packets QUIC initial decryption failed. not applying tampering because desync_any_proto is not set packet: id=176 reinject unmodified packet: id=177 len=67 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.73.95 proto=udp ttl=64 sport=55839 dport=443 UDP: len=39 : E5 00 00 00 01 08 FF 21 9F E9 C7 AC 77 AC 00 40 16 9B D7 97 3D 26 F7 26 80 52 F3 FE 20 DD 4A C7 ... : .......!....w..@....=&.&.R.. .J. ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=177 reinject unmodified packet: id=178 len=52 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 173.194.73.95 => 192.168.1.6 proto=tcp ttl=122 sport=443 dport=51397 flags=SA seq=1476360921 ack_seq=2782453215 using cached desync profile 10 incoming TTL 122 packet: id=178 reinject unmodified packet: id=179 len=52 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 64.233.165.198 => 192.168.1.6 proto=tcp ttl=122 sport=443 dport=51398 flags=SA seq=2103117189 ack_seq=4065935970 using cached desync profile 10 incoming TTL 122 packet: id=179 reinject unmodified packet: id=180 len=68 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.73.95 proto=udp ttl=64 sport=55839 dport=443 UDP: len=40 : EA 00 00 00 01 08 FF 21 9F E9 C7 AC 77 AC 00 40 17 CA EA 2D 12 F6 ED 07 E3 F4 F4 57 EB 37 BB 85 ... : .......!....w..@...-.......W.7.. ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=180 reinject unmodified packet: id=181 len=1452 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.73.95 proto=tcp ttl=64 sport=51397 dport=443 flags=A seq=2782453215 ack_seq=1476360922 TCP: len=1412 : 16 03 01 07 25 01 00 07 21 03 03 BD CC 63 29 72 B2 C8 C3 41 42 B1 D0 93 72 B8 44 AC 34 54 E7 7A ... : ....%...!....c)r...AB...r.D.4T.z ... using cached desync profile 10 Window size change 1025 => 1 packet contains partial TLS ClientHello starting reassemble. now we have 1412/1834 req retrans : seq interval 2782453215-2782454626 DELAY desync until reasm is complete (#1) packet: id=181 drop packet: id=182 len=462 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.73.95 proto=tcp ttl=64 sport=51397 dport=443 flags=AP seq=2782454627 ack_seq=1476360922 TCP: len=422 : 77 75 6F BD AB 5B E7 95 04 90 85 02 2C 77 59 67 87 68 47 91 10 65 50 21 4A CA 9B C0 8A 6D 73 06 ... : wuo..[......,wYg.hG..eP!J....ms. ... using cached desync profile 10 Window size change 1025 => 1 reassemble : feeding data payload size=422. now we have 1834/1834 packet contains full TLS ClientHello req retrans : seq interval 2782453215-2782455048 forced wssize-cutoff DELAY desync until reasm is complete (#2) REPLAYING delayed packet #1 offset 0 REPLAY IP4: 192.168.1.6 => 173.194.73.95 proto=tcp ttl=64 sport=51397 dport=443 flags=A seq=2782453215 ack_seq=1476360922 TCP: len=1412 : 16 03 01 07 25 01 00 07 21 03 03 BD CC 63 29 72 B2 C8 C3 41 42 B1 D0 93 72 B8 44 AC 34 54 E7 7A ... : ....%...!....c)r...AB...r.D.4T.z ... using cached desync profile 10 packet contains full TLS ClientHello hostname: ogads-pa.clients6.google.com discovered l7 protocol discovered hostname desync profile search for tcp target=173.194.73.95:443 l7proto=tls hostname='ogads-pa.clients6.google.com' * hostlist check for profile 1 [C:\Users\ads\Desktop\YTDisBystroold\lists\netrogat.txt] include hostlist check for ogads-pa.clients6.google.com : negative hostlist check for clients6.google.com : negative hostlist check for google.com : negative hostlist check for com : negative * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 173.194.73.95 : negative * hostlist check for profile 4 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube.txt] include hostlist check for ogads-pa.clients6.google.com : negative hostlist check for clients6.google.com : negative hostlist check for google.com : negative hostlist check for com : negative * hostlist check for profile 6 [C:\Users\ads\Desktop\YTDisBystroold\lists\myhostlist.txt] include hostlist check for ogads-pa.clients6.google.com : negative hostlist check for clients6.google.com : negative hostlist check for google.com : negative hostlist check for com : negative [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-blacklist.txt] include hostlist check for ogads-pa.clients6.google.com : negative hostlist check for clients6.google.com : negative hostlist check for google.com : negative hostlist check for com : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 173.194.73.95 : negative desync profile 10 matches dpi desync src=192.168.1.6:51397 dst=173.194.73.95:443 regular split pos: 156 normalized regular split pos : 156 seqovl : 1 sending fake(1) 1st tcp segment 0-155 len=156 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending 1st tcp segment 0-155 len=156 seqovl=1 : 00 16 03 01 07 25 01 00 07 21 03 03 BD CC 63 29 72 B2 C8 C3 41 42 B1 D0 93 72 B8 44 AC 34 54 E7 ... : .....%...!....c)r...AB...r.D.4T. ... sending fake(2) 1st tcp segment 0-155 len=156 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending fake(1) 2nd tcp segment 156-1411 len=1256 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending 2nd tcp segment 156-1411 len=1256 : 6F 67 6C 65 2E 63 6F 6D 00 0A 00 0C 00 0A EA EA 63 99 00 1D 00 17 00 18 00 10 00 0E 00 0C 02 68 ... : ogle.com........c..............h ... sending fake(2) 2nd tcp segment 156-1411 len=1256 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... DROPPING delayed packet #1 REPLAYING delayed packet #2 offset 1412 REPLAY IP4: 192.168.1.6 => 173.194.73.95 proto=tcp ttl=64 sport=51397 dport=443 flags=AP seq=2782454627 ack_seq=1476360922 TCP: len=422 : 77 75 6F BD AB 5B E7 95 04 90 85 02 2C 77 59 67 87 68 47 91 10 65 50 21 4A CA 9B C0 8A 6D 73 06 ... : wuo..[......,wYg.hG..eP!J....ms. ... using cached desync profile 10 packet contains full TLS ClientHello hostname: ogads-pa.clients6.google.com dpi desync src=192.168.1.6:51397 dst=173.194.73.95:443 regular split pos: 156 regular split pos is outside of this packet seqovl : 1 SENDING delayed packet #2 unmodified reassemble session finished packet: id=182 drop packet: id=183 len=1452 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.198 proto=tcp ttl=64 sport=51398 dport=443 flags=A seq=4065935970 ack_seq=2103117190 TCP: len=1412 : 16 03 01 06 B8 01 00 06 B4 03 03 3B 2B 05 C9 6F 7C 30 9E 13 B4 5A 14 DF D3 00 8E 3C 83 71 37 24 ... : ...........;+..o|0...Z.....<.q7$ ... using cached desync profile 10 Window size change 1025 => 1 packet contains partial TLS ClientHello starting reassemble. now we have 1412/1725 req retrans : seq interval 4065935970-4065937381 DELAY desync until reasm is complete (#1) packet: id=183 drop packet: id=184 len=353 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.198 proto=tcp ttl=64 sport=51398 dport=443 flags=AP seq=4065937382 ack_seq=2103117190 TCP: len=313 : C5 7C EE A8 A5 F0 44 A0 67 15 B7 86 E3 4A CE DA 35 10 1B 34 D7 B7 0C A4 1B 0E 87 83 0B B3 A8 6E ... : .|....D.g....J..5..4...........n ... using cached desync profile 10 Window size change 1025 => 1 reassemble : feeding data payload size=313. now we have 1725/1725 packet contains full TLS ClientHello req retrans : seq interval 4065935970-4065937694 forced wssize-cutoff DELAY desync until reasm is complete (#2) REPLAYING delayed packet #1 offset 0 REPLAY IP4: 192.168.1.6 => 64.233.165.198 proto=tcp ttl=64 sport=51398 dport=443 flags=A seq=4065935970 ack_seq=2103117190 TCP: len=1412 : 16 03 01 06 B8 01 00 06 B4 03 03 3B 2B 05 C9 6F 7C 30 9E 13 B4 5A 14 DF D3 00 8E 3C 83 71 37 24 ... : ...........;+..o|0...Z.....<.q7$ ... using cached desync profile 10 packet contains full TLS ClientHello hostname: www.youtube.com discovered l7 protocol discovered hostname desync profile search for tcp target=64.233.165.198:443 l7proto=tls hostname='www.youtube.com' * hostlist check for profile 1 [C:\Users\ads\Desktop\YTDisBystroold\lists\netrogat.txt] include hostlist check for www.youtube.com : negative hostlist check for youtube.com : negative hostlist check for com : negative * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 64.233.165.198 : negative * hostlist check for profile 4 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube.txt] include hostlist check for www.youtube.com : negative hostlist check for youtube.com : positive desync profile 4 matches desync profile changed by revealed l7 protocol or hostname ! autottl: guessed 5 dpi desync src=192.168.1.6:51398 dst=64.233.165.198:443 multisplit pos: 2 normalized multisplit pos: 2 seqovl : 2 sending fake : 16 03 01 02 87 01 00 02 83 03 03 5F 15 63 CB 06 EA 1C DD 40 76 F5 8C 44 50 6E 01 F3 A3 83 AC C2 ... : ..........._.c.....@v..DPn...... ... sending multisplit part 1 0-1 len=2 seqovl=2 : 00 00 16 03 : .... sending multisplit part 2 2-1411 len=1410 seqovl=0 : 01 06 B8 01 00 06 B4 03 03 3B 2B 05 C9 6F 7C 30 9E 13 B4 5A 14 DF D3 00 8E 3C 83 71 37 24 E4 C0 ... : .........;+..o|0...Z.....<.q7$.. ... DROPPING delayed packet #1 REPLAYING delayed packet #2 offset 1412 REPLAY IP4: 192.168.1.6 => 64.233.165.198 proto=tcp ttl=64 sport=51398 dport=443 flags=AP seq=4065937382 ack_seq=2103117190 TCP: len=313 : C5 7C EE A8 A5 F0 44 A0 67 15 B7 86 E3 4A CE DA 35 10 1B 34 D7 B7 0C A4 1B 0E 87 83 0B B3 A8 6E ... : .|....D.g....J..5..4...........n ... using cached desync profile 4 packet contains full TLS ClientHello hostname: www.youtube.com dpi desync src=192.168.1.6:51398 dst=64.233.165.198:443 multisplit pos: 2 all multisplit pos are outside of this packet seqovl : 2 SENDING delayed packet #2 unmodified reassemble session finished packet: id=184 drop packet: id=185 len=192 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.73.95 proto=udp ttl=64 sport=55839 dport=443 UDP: len=164 : EE 00 00 00 01 08 FF 21 9F E9 C7 AC 77 AC 00 40 49 1B 53 5F 49 A2 0A 20 D3 53 B5 DD EC 31 56 2F ... : .......!....w..@I.S_I.. .S...1V/ ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=185 reinject unmodified packet: id=186 len=1274 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.73.95 proto=udp ttl=64 sport=55839 dport=443 UDP: len=1246 : 58 FF 21 9F E9 C7 AC 77 AC F5 6F 8D A3 D5 3B 9B 97 CA 4D D2 99 CB 8C 53 8C A4 0E 09 77 A6 E1 28 ... : X.!....w..o...;...M....S....w..( ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=186 reinject unmodified packet: id=187 len=1278 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.73.95 proto=udp ttl=64 sport=55839 dport=443 UDP: len=1250 : 58 FF 21 9F E9 C7 AC 77 AC 19 FB DB 6A 58 D9 E1 D9 0C 03 E1 FA B3 50 2D 33 8F 9E EA 2A C3 D0 A0 ... : X.!....w....jX........P-3...*... ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=187 reinject unmodified packet: id=188 len=301 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.73.95 proto=udp ttl=64 sport=55839 dport=443 UDP: len=273 : 5E FF 21 9F E9 C7 AC 77 AC 5D 34 B5 56 55 56 20 E7 15 28 47 0F 3F 7B B0 8E E6 89 FA 00 B4 72 19 ... : ^.!....w.]4.VUV ..(G.?{.......r. ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=188 reinject unmodified packet: id=189 len=172 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.73.95 proto=udp ttl=64 sport=55839 dport=443 UDP: len=144 : 44 FF 21 9F E9 C7 AC 77 AC 5F 7D 60 29 88 F6 77 7A 32 D9 E1 F0 14 F1 2F 74 9F 33 FA CC AF EB 0B ... : D.!....w._}`)..wz2...../t.3..... ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=189 reinject unmodified packet: id=190 len=196 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.73.95 proto=udp ttl=64 sport=55839 dport=443 UDP: len=168 : E7 00 00 00 01 08 FF 21 9F E9 C7 AC 77 AC 00 40 4B 79 2A 56 19 47 77 D8 6C F2 C8 A9 19 9F 7B 94 ... : .......!....w..@Ky*V.Gw.l.....{. ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=190 reinject unmodified packet: id=191 len=1452 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.198 proto=tcp ttl=64 sport=51398 dport=443 flags=AP seq=4065936283 ack_seq=2103117190 TCP: len=1412 : 57 AD 04 9C 42 79 94 17 3A 99 24 EF C9 55 65 97 58 34 8B D6 97 C8 60 B5 6D 37 B3 95 8A E5 9C 78 ... : W...By..:.$..Ue.X4....`.m7.....x ... using cached desync profile 4 not applying tampering to unknown protocol packet: id=191 reinject unmodified packet: id=192 len=1278 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.73.95 proto=udp ttl=64 sport=55839 dport=443 UDP: len=1250 : EE 00 00 00 01 08 FF 21 9F E9 C7 AC 77 AC 00 40 4D 99 45 86 E0 96 D3 79 FD AA 35 4D 6D F8 90 27 ... : .......!....w..@M.E....y..5Mm..' ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=192 reinject unmodified packet: id=193 len=63 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.73.95 proto=udp ttl=64 sport=55839 dport=443 UDP: len=35 : 51 FF 21 9F E9 C7 AC 77 AC 67 C6 36 1F 34 EC DE 0A E5 9C A6 9E 47 5D 08 19 84 F1 AA C3 B8 D4 D1 ... : Q.!....w.g.6.4.......G]......... ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=193 reinject unmodified packet: id=194 len=63 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.73.95 proto=udp ttl=64 sport=55839 dport=443 UDP: len=35 : 4F FF 21 9F E9 C7 AC 77 AC 73 88 76 8A 88 E3 43 1B CD 67 95 AC CF 1A 4D C0 53 F2 60 4E C9 4B 47 ... : O.!....w.s.v...C..g....M.S.`N.KG ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=194 reinject unmodified packet: id=195 len=65 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.73.95 proto=udp ttl=64 sport=55839 dport=443 UDP: len=37 : 58 FF 21 9F E9 C7 AC 77 AC B2 6A DF 0F 91 F0 93 B1 AA 0F 32 D2 02 A2 69 58 F5 5B 01 E5 BE 28 17 ... : X.!....w..j........2...iX.[...(. ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=195 reinject unmodified packet: id=196 len=114 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.132 proto=tcp ttl=64 sport=51396 dport=443 flags=AP seq=4124157820 ack_seq=3909163138 TCP: len=74 : 14 03 03 00 01 01 17 03 03 00 3F 7E 78 0C 82 41 D3 AB 7A 5E 83 3B B2 76 81 58 81 F8 5A 70 B9 1C ... : ..........?~x..A..z^.;.v.X..Zp.. ... using cached desync profile 10 wssize-cutoff reached (mode n): 4/0 . not changing wssize. not applying tampering to unknown protocol packet: id=196 reinject unmodified packet: id=197 len=132 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.132 proto=tcp ttl=64 sport=51396 dport=443 flags=AP seq=4124157894 ack_seq=3909163138 TCP: len=92 : 17 03 03 00 57 32 CB 4A 77 52 7A 82 C6 49 7D 3E B7 4D B8 18 11 21 69 76 E1 92 CE 6B 05 AA D0 9B ... : ....W2.JwRz..I}>.M...!iv...k.... ... using cached desync profile 10 wssize-cutoff reached (mode n): 5/0 . not changing wssize. not applying tampering to unknown protocol packet: id=197 reinject unmodified packet: id=198 len=1452 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.132 proto=tcp ttl=64 sport=51396 dport=443 flags=A seq=4124157986 ack_seq=3909163138 TCP: len=1412 : 17 03 03 06 4F 35 58 30 6F 17 09 59 B1 36 2C 1C 58 7D 04 A7 69 04 6F 9D F4 64 AB C4 9C F2 4F EF ... : ....O5X0o..Y.6,.X}..i.o..d....O. ... using cached desync profile 10 wssize-cutoff reached (mode n): 6/0 . not changing wssize. not applying tampering to unknown protocol packet: id=198 reinject unmodified packet: id=199 len=248 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.132 proto=tcp ttl=64 sport=51396 dport=443 flags=AP seq=4124159398 ack_seq=3909163138 TCP: len=208 : C7 08 EC 3B 1B F1 E0 C2 39 3B 70 5B 9A 00 6A 17 E8 A9 2D 32 9E B9 31 9C 49 89 05 1F A3 38 21 51 ... : ...;....9;p[..j...-2..1.I....8!Q ... using cached desync profile 10 wssize-cutoff reached (mode n): 7/0 . not changing wssize. not applying tampering to unknown protocol packet: id=199 reinject unmodified packet: id=200 len=52 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=tcp ttl=64 sport=51399 dport=443 flags=S seq=1331683862 ack_seq=0 desync profile search for tcp target=74.125.131.100:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 74.125.131.100 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 74.125.131.100 : negative desync profile 10 matches Window size change 64240 => 1 Scale factor change 8 => 6 packet: id=200 reinject modified len=52 packet: id=201 len=60 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.73.95 proto=udp ttl=64 sport=55839 dport=443 UDP: len=32 : 58 FF 21 9F E9 C7 AC 77 AC 45 94 0D 3E 14 93 04 9F F1 04 43 18 ED 48 6D BF 95 AE 04 61 86 CA EB : X.!....w.E..>......C..Hm....a... using cached desync profile 0 not applying tampering to unknown protocol packet: id=201 reinject unmodified packet: id=202 len=71 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.132 proto=tcp ttl=64 sport=51396 dport=443 flags=AP seq=4124159606 ack_seq=3909164118 TCP: len=31 : 17 03 03 00 1A A8 44 9A CA 72 C3 78 6D 15 22 F3 08 71 EA CD 3A EE 18 FE 92 6E B2 AB 80 7C D5 : ......D..r.xm."..q..:....n...|. using cached desync profile 10 wssize-cutoff reached (mode n): 8/0 . not changing wssize. not applying tampering to unknown protocol packet: id=202 reinject unmodified packet: id=203 len=52 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 74.125.131.100 => 192.168.1.6 proto=tcp ttl=120 sport=443 dport=51399 flags=SA seq=657282749 ack_seq=1331683863 using cached desync profile 10 incoming TTL 120 packet: id=203 reinject unmodified packet: id=204 len=1452 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=tcp ttl=64 sport=51399 dport=443 flags=A seq=1331683863 ack_seq=657282750 TCP: len=1412 : 16 03 01 06 F8 01 00 06 F4 03 03 08 37 A9 09 0B 3B 94 E9 9F 8A BE 43 61 B8 88 46 A8 F1 09 8A A9 ... : ............7...;.....Ca..F..... ... using cached desync profile 10 Window size change 1025 => 1 packet contains partial TLS ClientHello starting reassemble. now we have 1412/1789 req retrans : seq interval 1331683863-1331685274 DELAY desync until reasm is complete (#1) packet: id=204 drop packet: id=205 len=417 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=tcp ttl=64 sport=51399 dport=443 flags=AP seq=1331685275 ack_seq=657282750 TCP: len=377 : 3F 61 17 F9 FF 5F 8C 58 12 76 DA 9E 2B AA B9 EC D7 37 B5 E7 F8 38 87 5F 17 60 13 34 D3 70 B0 CF ... : ?a..._.X.v..+....7...8._.`.4.p.. ... using cached desync profile 10 Window size change 1025 => 1 reassemble : feeding data payload size=377. now we have 1789/1789 packet contains full TLS ClientHello req retrans : seq interval 1331683863-1331685651 forced wssize-cutoff DELAY desync until reasm is complete (#2) REPLAYING delayed packet #1 offset 0 REPLAY IP4: 192.168.1.6 => 74.125.131.100 proto=tcp ttl=64 sport=51399 dport=443 flags=A seq=1331683863 ack_seq=657282750 TCP: len=1412 : 16 03 01 06 F8 01 00 06 F4 03 03 08 37 A9 09 0B 3B 94 E9 9F 8A BE 43 61 B8 88 46 A8 F1 09 8A A9 ... : ............7...;.....Ca..F..... ... using cached desync profile 10 packet contains full TLS ClientHello hostname: play.google.com discovered l7 protocol discovered hostname desync profile search for tcp target=74.125.131.100:443 l7proto=tls hostname='play.google.com' * hostlist check for profile 1 [C:\Users\ads\Desktop\YTDisBystroold\lists\netrogat.txt] include hostlist check for play.google.com : negative hostlist check for google.com : negative hostlist check for com : negative * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 74.125.131.100 : negative * hostlist check for profile 4 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube.txt] include hostlist check for play.google.com : positive desync profile 4 matches desync profile changed by revealed l7 protocol or hostname ! autottl: guessed 7 dpi desync src=192.168.1.6:51399 dst=74.125.131.100:443 multisplit pos: 2 normalized multisplit pos: 2 seqovl : 2 sending fake : 16 03 01 02 87 01 00 02 83 03 03 5F 15 63 CB 06 EA 1C DD 40 76 F5 8C 44 50 6E 01 F3 A3 83 AC C2 ... : ..........._.c.....@v..DPn...... ... sending multisplit part 1 0-1 len=2 seqovl=2 : 00 00 16 03 : .... sending multisplit part 2 2-1411 len=1410 seqovl=0 : 01 06 F8 01 00 06 F4 03 03 08 37 A9 09 0B 3B 94 E9 9F 8A BE 43 61 B8 88 46 A8 F1 09 8A A9 74 AF ... : ..........7...;.....Ca..F.....t. ... DROPPING delayed packet #1 REPLAYING delayed packet #2 offset 1412 REPLAY IP4: 192.168.1.6 => 74.125.131.100 proto=tcp ttl=64 sport=51399 dport=443 flags=AP seq=1331685275 ack_seq=657282750 TCP: len=377 : 3F 61 17 F9 FF 5F 8C 58 12 76 DA 9E 2B AA B9 EC D7 37 B5 E7 F8 38 87 5F 17 60 13 34 D3 70 B0 CF ... : ?a..._.X.v..+....7...8._.`.4.p.. ... using cached desync profile 4 packet contains full TLS ClientHello hostname: play.google.com dpi desync src=192.168.1.6:51399 dst=74.125.131.100:443 multisplit pos: 2 all multisplit pos are outside of this packet seqovl : 2 SENDING delayed packet #2 unmodified reassemble session finished packet: id=205 drop packet: id=206 len=114 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.73.95 proto=tcp ttl=64 sport=51397 dport=443 flags=AP seq=2782455049 ack_seq=1476371816 TCP: len=74 : 14 03 03 00 01 01 17 03 03 00 3F 60 A2 29 82 19 54 F9 33 A5 2A 25 75 47 27 79 7C 23 7D 81 0C 05 ... : ..........?`.)..T.3.*%uG'y|#}... ... using cached desync profile 10 wssize-cutoff reached (mode n): 4/0 . not changing wssize. not applying tampering to unknown protocol packet: id=206 reinject unmodified packet: id=207 len=114 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.198 proto=tcp ttl=64 sport=51398 dport=443 flags=AP seq=4065937695 ack_seq=2103125026 TCP: len=74 : 14 03 03 00 01 01 17 03 03 00 3F D1 D4 D8 EA 6A FB 39 E2 06 E1 B3 60 37 26 D3 BE EB DC 74 08 87 ... : ..........?....j.9....`7&....t.. ... using cached desync profile 4 not applying tampering to unknown protocol packet: id=207 reinject unmodified packet: id=208 len=132 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.198 proto=tcp ttl=64 sport=51398 dport=443 flags=AP seq=4065937769 ack_seq=2103125026 TCP: len=92 : 17 03 03 00 57 CA 3C 1A 59 C8 FF 96 93 C2 15 36 A0 A8 46 3D 2B D9 AE 75 13 B9 3F B5 AB A1 94 DB ... : ....W.<.Y......6..F=+..u..?..... ... using cached desync profile 4 not applying tampering to unknown protocol packet: id=208 reinject unmodified packet: id=209 len=1452 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.198 proto=tcp ttl=64 sport=51398 dport=443 flags=A seq=4065937861 ack_seq=2103125026 TCP: len=1412 : 17 03 03 09 8B 2E 31 B2 4D B0 34 51 D1 31 5E 18 B2 DB 9D A9 16 13 0D 8B 1D 1D 7C 39 6F 64 69 5C ... : ......1.M.4Q.1^...........|9odi\ ... using cached desync profile 4 not applying tampering to unknown protocol packet: id=209 reinject unmodified packet: id=210 len=1076 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.198 proto=tcp ttl=64 sport=51398 dport=443 flags=AP seq=4065939273 ack_seq=2103125026 TCP: len=1036 : 88 33 E0 4B FC A9 9E FA 81 80 8F 38 B4 16 30 87 28 01 20 52 06 4F 38 31 D6 14 FF 79 3F 73 F2 17 ... : .3.K.......8..0.(. R.O81...y?s.. ... using cached desync profile 4 not applying tampering to unknown protocol packet: id=210 reinject unmodified packet: id=211 len=71 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.198 proto=tcp ttl=64 sport=51398 dport=443 flags=AP seq=4065940309 ack_seq=2103125986 TCP: len=31 : 17 03 03 00 1A C1 D6 79 14 34 4B 54 32 57 80 57 BD DF FF 37 11 13 4F 6F 7D CB 67 67 2F C5 F3 : .......y.4KT2W.W...7..Oo}.gg/.. using cached desync profile 4 not applying tampering to unknown protocol packet: id=211 reinject unmodified packet: id=212 len=75 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.198 proto=tcp ttl=64 sport=51398 dport=443 flags=AP seq=4065940340 ack_seq=2103131339 TCP: len=35 : 17 03 03 00 1E 7A 37 62 47 9A C0 F8 E8 77 C4 17 D1 99 A2 05 FB F9 C1 AB AE 1F 26 EF 6D B9 9C B8 ... : .....z7bG....w............&.m... ... using cached desync profile 4 not applying tampering to unknown protocol packet: id=212 reinject unmodified packet: id=213 len=79 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.132 proto=tcp ttl=64 sport=51396 dport=443 flags=AP seq=4124159637 ack_seq=3909165440 TCP: len=39 : 17 03 03 00 22 AF 6B 02 CF 40 2F CB F4 3D 21 14 8D 3C 8E 92 18 41 47 BE C0 FC C2 F6 19 4C 9B B5 ... : ....".k..@/..=!..<...AG......L.. ... using cached desync profile 10 wssize-cutoff reached (mode n): 9/0 . not changing wssize. not applying tampering to unknown protocol packet: id=213 reinject unmodified packet: id=214 len=104 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=tcp ttl=64 sport=51399 dport=443 flags=AP seq=1331685652 ack_seq=657290422 TCP: len=64 : 14 03 03 00 01 01 17 03 03 00 35 71 DF F1 92 A1 FD A0 B6 C6 43 45 8F 8A 77 FE 44 94 7F AA 3A 38 ... : ..........5q........CE..w.D..:8 ... using cached desync profile 4 not applying tampering to unknown protocol packet: id=214 reinject unmodified packet: id=215 len=132 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=tcp ttl=64 sport=51399 dport=443 flags=AP seq=1331685716 ack_seq=657290422 TCP: len=92 : 17 03 03 00 57 FD AF 07 EE FC 64 54 9F 40 E2 31 B8 0C 14 7E 89 1F C8 92 48 5B 35 8F 33 B1 21 4D ... : ....W.....dT.@.1...~....H[5.3.!M ... using cached desync profile 4 not applying tampering to unknown protocol packet: id=215 reinject unmodified packet: id=216 len=441 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=tcp ttl=64 sport=51399 dport=443 flags=AP seq=1331685808 ack_seq=657290422 TCP: len=401 : 17 03 03 01 8C 9C C1 FB 16 70 82 AD AC 76 86 90 DF 3C 3E 7A CA 05 F9 03 29 6D EC 87 B2 DD 18 71 ... : .........p...v...<>z....)m.....q ... using cached desync profile 4 not applying tampering to unknown protocol packet: id=216 reinject unmodified packet: id=217 len=71 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=tcp ttl=64 sport=51399 dport=443 flags=AP seq=1331686209 ack_seq=657291038 TCP: len=31 : 17 03 03 00 1A C8 E1 49 9C 0A 87 65 22 57 02 CF 04 C6 F0 9F C0 19 F7 F1 ED 8F A4 5F 30 86 CB : .......I...e"W............._0.. using cached desync profile 4 not applying tampering to unknown protocol packet: id=217 reinject unmodified packet: id=218 len=79 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=tcp ttl=64 sport=51399 dport=443 flags=AP seq=1331686240 ack_seq=657291475 TCP: len=39 : 17 03 03 00 22 5B E6 4A 05 D1 DE 55 6F 79 23 2A 07 3C 8A 3B 1E 06 F8 00 97 8F A9 94 93 0D E8 1B ... : ...."[.J...Uoy#*.<.;............ ... using cached desync profile 4 not applying tampering to unknown protocol packet: id=218 reinject unmodified packet: id=219 len=1278 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=udp ttl=64 sport=55493 dport=443 UDP: len=1250 : CF 00 00 00 01 08 13 A7 E6 38 C4 D6 F1 7D 00 00 44 D0 38 20 AB 9F 62 A4 F4 35 1C 41 D9 2F 29 54 ... : .........8...}..D.8 ..b..5.A./)T ... desync profile search for udp target=74.125.131.100:443 l7proto=unknown hostname='' desync profile 0 matches packet contains QUIC initial packet contains partial TLS ClientHello starting reassemble. now we have 1215/16384 DELAY desync until reasm is complete (#1) packet: id=219 drop packet: id=220 len=1278 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=udp ttl=64 sport=55493 dport=443 UDP: len=1250 : C9 00 00 00 01 08 13 A7 E6 38 C4 D6 F1 7D 00 00 44 D0 0D A1 FB 4A FC 7E D6 05 75 A6 BC DC 0B E2 ... : .........8...}..D....J.~..u..... ... using cached desync profile 0 packet contains QUIC initial reassemble : feeding data payload size=1215. now we have 2430/16384 packet contains full TLS ClientHello DELAY desync until reasm is complete (#2) REPLAYING delayed packet #1 offset 0 REPLAY IP4: 192.168.1.6 => 74.125.131.100 proto=udp ttl=64 sport=55493 dport=443 UDP: len=1250 : CF 00 00 00 01 08 13 A7 E6 38 C4 D6 F1 7D 00 00 44 D0 38 20 AB 9F 62 A4 F4 35 1C 41 D9 2F 29 54 ... : .........8...}..D.8 ..b..5.A./)T ... using cached desync profile 0 packet contains QUIC initial packet contains full TLS ClientHello hostname: play.google.com discovered l7 protocol discovered hostname desync profile search for udp target=74.125.131.100:443 l7proto=quic hostname='play.google.com' * hostlist check for profile 3 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtubeQ.txt] include hostlist check for play.google.com : positive desync profile 3 matches desync profile changed by revealed l7 protocol or hostname ! dpi desync src=192.168.1.6:55493 dst=74.125.131.100:443 sending fake : C3 00 00 00 01 08 70 AC 9C 05 F4 9D 2B FF 03 41 D2 60 00 42 15 78 AC E2 B5 0E 80 D3 A3 E8 B2 C2 ... : ......p.....+..A.`.B.x.......... ... resending original packet with increased by 2 length DROPPING delayed packet #1 REPLAYING delayed packet #2 offset 1250 REPLAY IP4: 192.168.1.6 => 74.125.131.100 proto=udp ttl=64 sport=55493 dport=443 UDP: len=1250 : C9 00 00 00 01 08 13 A7 E6 38 C4 D6 F1 7D 00 00 44 D0 0D A1 FB 4A FC 7E D6 05 75 A6 BC DC 0B E2 ... : .........8...}..D....J.~..u..... ... SENDING delayed packet #2 unmodified reassemble session finished packet: id=220 drop packet: id=221 len=1452 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=tcp ttl=64 sport=51394 dport=443 flags=A seq=2953451333 ack_seq=2293275617 TCP: len=1412 : 17 03 03 0A 33 9C C8 26 0F F1 64 C2 FF D4 03 2E 0E EB B5 6F FB 87 6C 83 C2 5B A0 77 3D 60 D0 2B ... : ....3..&..d........o..l..[.w=`.+ ... using cached desync profile 10 wssize-cutoff reached (mode n): 11/0 . not changing wssize. not applying tampering to unknown protocol packet: id=221 reinject unmodified packet: id=222 len=1244 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=tcp ttl=64 sport=51394 dport=443 flags=AP seq=2953452745 ack_seq=2293275617 TCP: len=1204 : 65 72 5E D1 A5 42 2E C1 10 55 56 32 DD A2 43 FC 03 E5 7E 31 E0 21 87 84 F4 ED B7 65 5D 3D 46 D7 ... : er^..B...UV2..C...~1.!.....e]=F. ... using cached desync profile 10 wssize-cutoff reached (mode n): 12/0 . not changing wssize. not applying tampering to unknown protocol packet: id=222 reinject unmodified packet: id=223 len=994 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=tcp ttl=64 sport=51394 dport=443 flags=AP seq=2953453949 ack_seq=2293275617 TCP: len=954 : 17 03 03 03 B5 E1 E1 49 ED 90 3E 91 79 2F 58 E4 8F FD 9A E7 38 54 92 7D 6F D4 B1 17 05 8E AD 2A ... : .......I..>.y/X.....8T.}o......* ... using cached desync profile 10 wssize-cutoff reached (mode n): 13/0 . not changing wssize. not applying tampering to unknown protocol packet: id=223 reinject unmodified packet: id=224 len=1278 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=udp ttl=64 sport=55493 dport=443 UDP: len=1250 : C5 00 00 00 01 08 F3 A7 E6 38 C4 D6 F1 7D 00 00 44 D0 1C CE 90 F6 C4 0D 98 1D 9A 50 FC DC 04 6D ... : .........8...}..D..........P...m ... using cached desync profile 3 desync-cutoff reached (mode n): 3/3 . not desyncing packet: id=224 reinject unmodified packet: id=225 len=67 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=udp ttl=64 sport=55493 dport=443 UDP: len=39 : E3 00 00 00 01 08 F3 A7 E6 38 C4 D6 F1 7D 00 40 16 4C 23 C4 CD 35 D8 21 F7 0A 85 AA AB 90 AD 64 ... : .........8...}.@.L#..5.!.......d ... using cached desync profile 3 desync-cutoff reached (mode n): 4/3 . not desyncing packet: id=225 reinject unmodified packet: id=226 len=68 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=udp ttl=64 sport=55493 dport=443 UDP: len=40 : E3 00 00 00 01 08 F3 A7 E6 38 C4 D6 F1 7D 00 40 17 18 E7 4C FF 88 F7 AF CD 02 20 5F BC F8 34 64 ... : .........8...}.@...L...... _..4d ... using cached desync profile 3 desync-cutoff reached (mode n): 5/3 . not desyncing packet: id=226 reinject unmodified packet: id=227 len=68 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=udp ttl=64 sport=55493 dport=443 UDP: len=40 : E5 00 00 00 01 08 F3 A7 E6 38 C4 D6 F1 7D 00 40 17 F6 E4 74 B2 AE 45 D3 BB 49 0B 78 3D C2 2E C4 ... : .........8...}.@...t..E..I.x=... ... using cached desync profile 3 desync-cutoff reached (mode n): 6/3 . not desyncing packet: id=227 reinject unmodified packet: id=228 len=111 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=udp ttl=64 sport=55493 dport=443 UDP: len=83 : E1 00 00 00 01 08 F3 A7 E6 38 C4 D6 F1 7D 00 40 42 25 6A 45 DA 8A 35 6E 62 A7 B3 41 A8 CC 34 BB ... : .........8...}.@B%jE..5nb..A..4. ... using cached desync profile 3 desync-cutoff reached (mode n): 7/3 . not desyncing packet: id=228 reinject unmodified packet: id=229 len=99 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=udp ttl=64 sport=55493 dport=443 UDP: len=71 : 58 F3 A7 E6 38 C4 D6 F1 7D B2 D7 82 DB 86 4F 14 B7 38 CE 39 D7 A8 75 EF 64 73 0F 54 11 B5 30 08 ... : X...8...}.....O..8.9..u.ds.T..0. ... using cached desync profile 3 desync-cutoff reached (mode n): 8/3 . not desyncing packet: id=229 reinject unmodified packet: id=230 len=40 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 64.233.165.198 => 192.168.1.6 proto=tcp ttl=122 sport=443 dport=51398 flags=AF seq=2103165854 ack_seq=4065940376 using cached desync profile 4 packet: id=230 reinject unmodified packet: id=231 len=40 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 64.233.162.84 => 192.168.1.6 proto=tcp ttl=122 sport=443 dport=51392 flags=AF seq=4201804721 ack_seq=769946686 using cached desync profile 10 packet: id=231 reinject unmodified packet: id=232 len=40 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 173.194.73.95 => 192.168.1.6 proto=tcp ttl=120 sport=443 dport=51395 flags=AF seq=719554184 ack_seq=2710836024 using cached desync profile 10 packet: id=232 reinject unmodified packet: id=233 len=40 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 74.125.131.100 => 192.168.1.6 proto=tcp ttl=120 sport=443 dport=51399 flags=AF seq=657291475 ack_seq=1331686280 using cached desync profile 4 packet: id=233 reinject unmodified packet: id=234 len=40 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 74.125.131.100 => 192.168.1.6 proto=tcp ttl=120 sport=443 dport=51394 flags=AF seq=2293276617 ack_seq=2953454904 using cached desync profile 10 packet: id=234 reinject unmodified packet: id=235 len=40 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 142.250.74.36 => 192.168.1.6 proto=tcp ttl=57 sport=443 dport=51393 flags=AF seq=2620971401 ack_seq=1750457582 using cached desync profile 10 packet: id=235 reinject unmodified packet: id=236 len=40 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 173.194.73.95 => 192.168.1.6 proto=tcp ttl=122 sport=443 dport=51397 flags=AF seq=1476372802 ack_seq=2782455124 using cached desync profile 10 packet: id=236 reinject unmodified packet: id=237 len=40 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 64.233.161.94 => 192.168.1.6 proto=tcp ttl=120 sport=443 dport=51391 flags=AF seq=3769814669 ack_seq=3792578241 using cached desync profile 10 packet: id=237 reinject unmodified packet: id=238 len=40 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 64.233.165.132 => 192.168.1.6 proto=tcp ttl=120 sport=443 dport=51396 flags=AF seq=3909165440 ack_seq=4124159677 using cached desync profile 10 packet: id=238 reinject unmodified packet: id=239 len=60 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=udp ttl=64 sport=55493 dport=443 UDP: len=32 : 5E F3 A7 E6 38 C4 D6 F1 7D D5 F0 EF 27 05 24 DA B3 0A EC 0B 56 9E 12 F1 93 97 65 D7 41 D9 8E D2 : ^...8...}...'.$.....V.....e.A... using cached desync profile 3 desync-cutoff reached (mode n): 9/3 . not desyncing packet: id=239 reinject unmodified packet: id=240 len=52 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 216.58.207.227 proto=tcp ttl=64 sport=51400 dport=443 flags=S seq=1683835730 ack_seq=0 desync profile search for tcp target=216.58.207.227:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 216.58.207.227 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 216.58.207.227 : negative desync profile 10 matches Window size change 64240 => 1 Scale factor change 8 => 6 packet: id=240 reinject modified len=52 packet: id=241 len=59 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=udp ttl=64 sport=55493 dport=443 UDP: len=31 : 41 F3 A7 E6 38 C4 D6 F1 7D D8 F3 CF F3 05 1C 20 97 75 51 7C 00 9B 9E ED F0 DD C9 21 45 C0 7D : A...8...}...... .uQ|.......!E.} using cached desync profile 3 desync-cutoff reached (mode n): 10/3 . not desyncing packet: id=241 reinject unmodified packet: id=242 len=52 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 216.58.207.227 => 192.168.1.6 proto=tcp ttl=59 sport=443 dport=51400 flags=SA seq=2007965326 ack_seq=1683835731 using cached desync profile 10 incoming TTL 59 packet: id=242 reinject unmodified packet: id=243 len=1452 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 216.58.207.227 proto=tcp ttl=64 sport=51400 dport=443 flags=A seq=1683835731 ack_seq=2007965327 TCP: len=1412 : 16 03 01 07 1E 01 00 07 1A 03 03 01 5A D3 67 88 F7 F2 BA 8B 74 47 5C 9B 09 0E 5A 90 F7 CA 9C 77 ... : ............Z.g.....tG\...Z....w ... using cached desync profile 10 Window size change 1025 => 1 packet contains partial TLS ClientHello starting reassemble. now we have 1412/1827 req retrans : seq interval 1683835731-1683837142 DELAY desync until reasm is complete (#1) packet: id=243 drop packet: id=244 len=455 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 216.58.207.227 proto=tcp ttl=64 sport=51400 dport=443 flags=AP seq=1683837143 ack_seq=2007965327 TCP: len=415 : 24 12 29 5F A2 44 25 3A D8 7F 0A 11 2B E7 E2 C8 E7 97 9A C4 60 91 3F A5 71 EE 44 31 23 96 CB 1F ... : $.)_.D%:...+.......`.?.q.D1#... ... using cached desync profile 10 Window size change 1025 => 1 reassemble : feeding data payload size=415. now we have 1827/1827 packet contains full TLS ClientHello req retrans : seq interval 1683835731-1683837557 forced wssize-cutoff DELAY desync until reasm is complete (#2) REPLAYING delayed packet #1 offset 0 REPLAY IP4: 192.168.1.6 => 216.58.207.227 proto=tcp ttl=64 sport=51400 dport=443 flags=A seq=1683835731 ack_seq=2007965327 TCP: len=1412 : 16 03 01 07 1E 01 00 07 1A 03 03 01 5A D3 67 88 F7 F2 BA 8B 74 47 5C 9B 09 0E 5A 90 F7 CA 9C 77 ... : ............Z.g.....tG\...Z....w ... using cached desync profile 10 packet contains full TLS ClientHello hostname: update.googleapis.com discovered l7 protocol discovered hostname desync profile search for tcp target=216.58.207.227:443 l7proto=tls hostname='update.googleapis.com' * hostlist check for profile 1 [C:\Users\ads\Desktop\YTDisBystroold\lists\netrogat.txt] include hostlist check for update.googleapis.com : negative hostlist check for googleapis.com : negative hostlist check for com : negative * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 216.58.207.227 : negative * hostlist check for profile 4 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube.txt] include hostlist check for update.googleapis.com : negative hostlist check for googleapis.com : negative hostlist check for com : negative * hostlist check for profile 6 [C:\Users\ads\Desktop\YTDisBystroold\lists\myhostlist.txt] include hostlist check for update.googleapis.com : negative hostlist check for googleapis.com : negative hostlist check for com : negative [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-blacklist.txt] include hostlist check for update.googleapis.com : negative hostlist check for googleapis.com : negative hostlist check for com : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 216.58.207.227 : negative desync profile 10 matches dpi desync src=192.168.1.6:51400 dst=216.58.207.227:443 regular split pos: 482 normalized regular split pos : 482 seqovl : 1 sending fake(1) 1st tcp segment 0-481 len=482 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending 1st tcp segment 0-481 len=482 seqovl=1 : 00 16 03 01 07 1E 01 00 07 1A 03 03 01 5A D3 67 88 F7 F2 BA 8B 74 47 5C 9B 09 0E 5A 90 F7 CA 9C ... : .............Z.g.....tG\...Z.... ... sending fake(2) 1st tcp segment 0-481 len=482 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending fake(1) 2nd tcp segment 482-1411 len=930 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending 2nd tcp segment 482-1411 len=930 : 6C 65 61 70 69 73 2E 63 6F 6D 00 2D 00 02 01 01 00 17 00 00 00 33 04 EF 04 ED AA AA 00 01 00 63 ... : leapis.com.-.........3.........c ... sending fake(2) 2nd tcp segment 482-1411 len=930 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... DROPPING delayed packet #1 REPLAYING delayed packet #2 offset 1412 REPLAY IP4: 192.168.1.6 => 216.58.207.227 proto=tcp ttl=64 sport=51400 dport=443 flags=AP seq=1683837143 ack_seq=2007965327 TCP: len=415 : 24 12 29 5F A2 44 25 3A D8 7F 0A 11 2B E7 E2 C8 E7 97 9A C4 60 91 3F A5 71 EE 44 31 23 96 CB 1F ... : $.)_.D%:...+.......`.?.q.D1#... ... using cached desync profile 10 packet contains full TLS ClientHello hostname: update.googleapis.com dpi desync src=192.168.1.6:51400 dst=216.58.207.227:443 regular split pos: 482 regular split pos is outside of this packet seqovl : 1 SENDING delayed packet #2 unmodified reassemble session finished packet: id=244 drop packet: id=245 len=1278 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.198 proto=udp ttl=64 sport=50723 dport=443 UDP: len=1250 : CF 00 00 00 01 08 A5 79 98 FA F8 3E EC AD 00 00 44 D0 24 8F 8B 7B 4F 91 2D 9C 04 B6 B2 2C 78 F6 ... : .......y...>....D.$..{O.-....,x. ... desync profile search for udp target=64.233.165.198:443 l7proto=unknown hostname='' desync profile 0 matches packet contains QUIC initial packet contains partial TLS ClientHello starting reassemble. now we have 1215/16384 DELAY desync until reasm is complete (#1) packet: id=245 drop packet: id=246 len=1278 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.198 proto=udp ttl=64 sport=50723 dport=443 UDP: len=1250 : CB 00 00 00 01 08 A5 79 98 FA F8 3E EC AD 00 00 44 D0 2C 26 0C F5 39 E3 61 48 EC EE 73 CB 54 AE ... : .......y...>....D.,&..9.aH..s.T. ... using cached desync profile 0 packet contains QUIC initial reassemble : feeding data payload size=1215. now we have 2430/16384 packet contains full TLS ClientHello DELAY desync until reasm is complete (#2) REPLAYING delayed packet #1 offset 0 REPLAY IP4: 192.168.1.6 => 64.233.165.198 proto=udp ttl=64 sport=50723 dport=443 UDP: len=1250 : CF 00 00 00 01 08 A5 79 98 FA F8 3E EC AD 00 00 44 D0 24 8F 8B 7B 4F 91 2D 9C 04 B6 B2 2C 78 F6 ... : .......y...>....D.$..{O.-....,x. ... using cached desync profile 0 packet contains QUIC initial packet contains full TLS ClientHello hostname: www.youtube.com discovered l7 protocol discovered hostname desync profile search for udp target=64.233.165.198:443 l7proto=quic hostname='www.youtube.com' * hostlist check for profile 3 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtubeQ.txt] include hostlist check for www.youtube.com : negative hostlist check for youtube.com : positive desync profile 3 matches desync profile changed by revealed l7 protocol or hostname ! dpi desync src=192.168.1.6:50723 dst=64.233.165.198:443 sending fake : C3 00 00 00 01 08 70 AC 9C 05 F4 9D 2B FF 03 41 D2 60 00 42 15 78 AC E2 B5 0E 80 D3 A3 E8 B2 C2 ... : ......p.....+..A.`.B.x.......... ... resending original packet with increased by 2 length DROPPING delayed packet #1 REPLAYING delayed packet #2 offset 1250 REPLAY IP4: 192.168.1.6 => 64.233.165.198 proto=udp ttl=64 sport=50723 dport=443 UDP: len=1250 : CB 00 00 00 01 08 A5 79 98 FA F8 3E EC AD 00 00 44 D0 2C 26 0C F5 39 E3 61 48 EC EE 73 CB 54 AE ... : .......y...>....D.,&..9.aH..s.T. ... SENDING delayed packet #2 unmodified reassemble session finished packet: id=246 drop packet: id=247 len=52 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.198 proto=tcp ttl=64 sport=51401 dport=443 flags=S seq=2455192145 ack_seq=0 desync profile search for tcp target=64.233.165.198:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 64.233.165.198 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 64.233.165.198 : negative desync profile 10 matches Window size change 64240 => 1 Scale factor change 8 => 6 packet: id=247 reinject modified len=52 packet: id=248 len=1278 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.198 proto=udp ttl=64 sport=50723 dport=443 UDP: len=1250 : C7 00 00 00 01 08 E5 79 98 FA F8 3E EC AD 00 00 44 D0 E1 DA 04 02 AD E1 A8 B6 85 29 22 62 8B DB ... : .......y...>....D..........)"b.. ... using cached desync profile 3 desync-cutoff reached (mode n): 3/3 . not desyncing packet: id=248 reinject unmodified packet: id=249 len=67 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.198 proto=udp ttl=64 sport=50723 dport=443 UDP: len=39 : E1 00 00 00 01 08 E5 79 98 FA F8 3E EC AD 00 40 16 79 3E 46 A3 5C 29 3B 4D 63 8B B8 CE 56 BB 10 ... : .......y...>...@.y>F.\);Mc...V.. ... using cached desync profile 3 desync-cutoff reached (mode n): 4/3 . not desyncing packet: id=249 reinject unmodified packet: id=250 len=52 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 64.233.165.198 => 192.168.1.6 proto=tcp ttl=122 sport=443 dport=51401 flags=SA seq=597358507 ack_seq=2455192146 using cached desync profile 10 incoming TTL 122 packet: id=250 reinject unmodified packet: id=251 len=68 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.198 proto=udp ttl=64 sport=50723 dport=443 UDP: len=40 : E0 00 00 00 01 08 E5 79 98 FA F8 3E EC AD 00 40 17 FD 99 B4 9A 38 7A 5E 31 D8 66 E6 CA C4 0B 17 ... : .......y...>...@.....8z^1.f..... ... using cached desync profile 3 desync-cutoff reached (mode n): 5/3 . not desyncing packet: id=251 reinject unmodified packet: id=252 len=1452 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.198 proto=tcp ttl=64 sport=51401 dport=443 flags=A seq=2455192146 ack_seq=597358508 TCP: len=1412 : 16 03 01 08 9F 01 00 08 9B 03 03 27 06 5A DD 2F 40 03 CB CD B1 F7 40 30 93 21 C4 86 95 A9 F3 3B ... : ...........'.Z./@.....@0.!.....; ... using cached desync profile 10 Window size change 1025 => 1 packet contains partial TLS ClientHello starting reassemble. now we have 1412/2212 req retrans : seq interval 2455192146-2455193557 DELAY desync until reasm is complete (#1) packet: id=252 drop packet: id=253 len=840 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.198 proto=tcp ttl=64 sport=51401 dport=443 flags=AP seq=2455193558 ack_seq=597358508 TCP: len=800 : 00 0F 77 77 77 2E 79 6F 75 74 75 62 65 2E 63 6F 6D 00 17 00 00 00 2B 00 07 06 AA AA 03 04 03 03 ... : ..www.youtube.com.....+......... ... using cached desync profile 10 Window size change 1025 => 1 reassemble : feeding data payload size=800. now we have 2212/2212 packet contains full TLS ClientHello req retrans : seq interval 2455192146-2455194357 forced wssize-cutoff DELAY desync until reasm is complete (#2) REPLAYING delayed packet #1 offset 0 REPLAY IP4: 192.168.1.6 => 64.233.165.198 proto=tcp ttl=64 sport=51401 dport=443 flags=A seq=2455192146 ack_seq=597358508 TCP: len=1412 : 16 03 01 08 9F 01 00 08 9B 03 03 27 06 5A DD 2F 40 03 CB CD B1 F7 40 30 93 21 C4 86 95 A9 F3 3B ... : ...........'.Z./@.....@0.!.....; ... using cached desync profile 10 packet contains full TLS ClientHello hostname: www.youtube.com discovered l7 protocol discovered hostname desync profile search for tcp target=64.233.165.198:443 l7proto=tls hostname='www.youtube.com' * hostlist check for profile 1 [C:\Users\ads\Desktop\YTDisBystroold\lists\netrogat.txt] include hostlist check for www.youtube.com : negative hostlist check for youtube.com : negative hostlist check for com : negative * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 64.233.165.198 : negative * hostlist check for profile 4 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube.txt] include hostlist check for www.youtube.com : negative hostlist check for youtube.com : positive desync profile 4 matches desync profile changed by revealed l7 protocol or hostname ! autottl: guessed 5 dpi desync src=192.168.1.6:51401 dst=64.233.165.198:443 multisplit pos: 2 normalized multisplit pos: 2 seqovl : 2 sending fake : 16 03 01 02 87 01 00 02 83 03 03 5F 15 63 CB 06 EA 1C DD 40 76 F5 8C 44 50 6E 01 F3 A3 83 AC C2 ... : ..........._.c.....@v..DPn...... ... sending multisplit part 1 0-1 len=2 seqovl=2 : 00 00 16 03 : .... sending multisplit part 2 2-1411 len=1410 seqovl=0 : 01 08 9F 01 00 08 9B 03 03 27 06 5A DD 2F 40 03 CB CD B1 F7 40 30 93 21 C4 86 95 A9 F3 3B D4 83 ... : .........'.Z./@.....@0.!.....;.. ... DROPPING delayed packet #1 REPLAYING delayed packet #2 offset 1412 REPLAY IP4: 192.168.1.6 => 64.233.165.198 proto=tcp ttl=64 sport=51401 dport=443 flags=AP seq=2455193558 ack_seq=597358508 TCP: len=800 : 00 0F 77 77 77 2E 79 6F 75 74 75 62 65 2E 63 6F 6D 00 17 00 00 00 2B 00 07 06 AA AA 03 04 03 03 ... : ..www.youtube.com.....+......... ... using cached desync profile 4 packet contains full TLS ClientHello hostname: www.youtube.com dpi desync src=192.168.1.6:51401 dst=64.233.165.198:443 multisplit pos: 2 all multisplit pos are outside of this packet seqovl : 2 SENDING delayed packet #2 unmodified reassemble session finished packet: id=253 drop packet: id=254 len=117 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.198 proto=udp ttl=64 sport=50723 dport=443 UDP: len=89 : E0 00 00 00 01 08 E5 79 98 FA F8 3E EC AD 00 40 48 26 28 DC B5 23 ED 83 58 E0 76 CA 1B 70 0A AA ... : .......y...>...@H&(..#..X.v..p.. ... using cached desync profile 3 desync-cutoff reached (mode n): 6/3 . not desyncing packet: id=254 reinject unmodified packet: id=255 len=99 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.198 proto=udp ttl=64 sport=50723 dport=443 UDP: len=71 : 56 E5 79 98 FA F8 3E EC AD B0 BC ED AB 9F 65 FC 4E 23 1A 1D C6 D8 4E 5E 3F E7 1C A3 7A 9B 5A 3E ... : V.y...>.......e.N#....N^?...z.Z> ... using cached desync profile 3 desync-cutoff reached (mode n): 7/3 . not desyncing packet: id=255 reinject unmodified packet: id=256 len=1274 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.198 proto=udp ttl=64 sport=50723 dport=443 UDP: len=1246 : 54 E5 79 98 FA F8 3E EC AD 26 6F 28 1E 17 AD 4F B6 18 72 5A 07 1F 05 E9 88 3D 03 1D 9D D0 B8 52 ... : T.y...>..&o(...O..rZ.....=.....R ... using cached desync profile 3 desync-cutoff reached (mode n): 8/3 . not desyncing packet: id=256 reinject unmodified packet: id=257 len=754 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.198 proto=udp ttl=64 sport=50723 dport=443 UDP: len=726 : 43 E5 79 98 FA F8 3E EC AD 7A 3A C2 DC 7C C6 70 B0 98 94 B2 49 FE 6D 7B 1C 20 A5 0D DE 61 B1 42 ... : C.y...>..z:..|.p....I.m{. ...a.B ... using cached desync profile 3 desync-cutoff reached (mode n): 9/3 . not desyncing packet: id=257 reinject unmodified packet: id=258 len=196 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.198 proto=udp ttl=64 sport=50723 dport=443 UDP: len=168 : E3 00 00 00 01 08 E5 79 98 FA F8 3E EC AD 00 40 49 1F E3 D5 FE A5 03 21 7F AA 73 C2 09 A5 AB A8 ... : .......y...>...@I......!.s..... ... using cached desync profile 3 desync-cutoff reached (mode n): 10/3 . not desyncing packet: id=258 reinject unmodified packet: id=259 len=61 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.198 proto=udp ttl=64 sport=50723 dport=443 UDP: len=33 : 58 E5 79 98 FA F8 3E EC AD 34 7C 54 BC 93 0C 47 4C 5C E2 EB 15 76 40 E2 2B A4 03 6E E9 8D 99 00 ... : X.y...>..4|T...GL\...v@.+..n.... ... using cached desync profile 3 desync-cutoff reached (mode n): 11/3 . not desyncing packet: id=259 reinject unmodified packet: id=260 len=61 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.198 proto=udp ttl=64 sport=50723 dport=443 UDP: len=33 : 49 E5 79 98 FA F8 3E EC AD 04 81 EF AB 7A 4D 0F 02 90 A6 9F 62 68 29 AF 01 E5 3E 60 BA 05 F5 A6 ... : I.y...>......zM.....bh)...>`.... ... using cached desync profile 3 desync-cutoff reached (mode n): 12/3 . not desyncing packet: id=260 reinject unmodified packet: id=261 len=59 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.198 proto=udp ttl=64 sport=50723 dport=443 UDP: len=31 : 55 E5 79 98 FA F8 3E EC AD 3A 8B F5 2F 84 68 64 6B 34 F6 52 A3 63 A8 04 C4 3B 1A F3 17 6E 48 : U.y...>..:../.hdk4.R.c...;...nH using cached desync profile 3 desync-cutoff reached (mode n): 13/3 . not desyncing packet: id=261 reinject unmodified packet: id=262 len=63 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.198 proto=udp ttl=64 sport=50723 dport=443 UDP: len=35 : 54 E5 79 98 FA F8 3E EC AD 9E 88 74 B9 20 62 42 89 9D BD 7A CE 4A BA 36 75 B1 85 DC B5 1A 25 64 ... : T.y...>....t. bB...z.J.6u.....%d ... using cached desync profile 3 desync-cutoff reached (mode n): 14/3 . not desyncing packet: id=262 reinject unmodified packet: id=263 len=114 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 216.58.207.227 proto=tcp ttl=64 sport=51400 dport=443 flags=AP seq=1683837558 ack_seq=2007971078 TCP: len=74 : 14 03 03 00 01 01 17 03 03 00 3F 3C 92 14 41 A4 6A 8C 83 C2 A4 8B 59 88 31 47 D0 05 08 66 47 26 ... : ..........?<..A.j.....Y.1G...fG& ... using cached desync profile 10 wssize-cutoff reached (mode n): 4/0 . not changing wssize. not applying tampering to unknown protocol packet: id=263 reinject unmodified packet: id=264 len=132 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 216.58.207.227 proto=tcp ttl=64 sport=51400 dport=443 flags=AP seq=1683837632 ack_seq=2007971078 TCP: len=92 : 17 03 03 00 57 F0 E0 F2 DB D0 C6 8B 39 20 8B DB 56 2B B4 CB 61 59 AF 29 49 A5 6D 60 A2 ED 32 31 ... : ....W.......9 ..V+..aY.)I.m`..21 ... using cached desync profile 10 wssize-cutoff reached (mode n): 5/0 . not changing wssize. not applying tampering to unknown protocol packet: id=264 reinject unmodified packet: id=265 len=745 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 216.58.207.227 proto=tcp ttl=64 sport=51400 dport=443 flags=AP seq=1683837724 ack_seq=2007971078 TCP: len=705 : 17 03 03 02 BC FF 15 7D AE 06 A0 34 A9 19 AF 29 F1 2D 53 8D 13 D9 DC FD 04 47 7E DD B0 25 44 28 ... : .......}...4...).-S......G~..%D( ... using cached desync profile 10 wssize-cutoff reached (mode n): 6/0 . not changing wssize. not applying tampering to unknown protocol packet: id=265 reinject unmodified packet: id=266 len=1452 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 216.58.207.227 proto=tcp ttl=64 sport=51400 dport=443 flags=A seq=1683838429 ack_seq=2007971078 TCP: len=1412 : 17 03 03 0F 00 67 D5 47 7E F2 D8 6F EE 15 E7 50 6A 50 4D 39 1B 61 47 24 E8 E9 FF 30 DB 11 5B 30 ... : .....g.G~..o...PjPM9.aG$...0..[0 ... using cached desync profile 10 wssize-cutoff reached (mode n): 7/0 . not changing wssize. not applying tampering to unknown protocol packet: id=266 reinject unmodified packet: id=267 len=1452 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 216.58.207.227 proto=tcp ttl=64 sport=51400 dport=443 flags=A seq=1683839841 ack_seq=2007971078 TCP: len=1412 : 09 3E 8D 14 5F 4B 1E 40 FC 9F A9 83 6B F3 B1 EC 2B D1 50 36 DB DB 79 D2 0A 78 F2 DD 3E D9 24 40 ... : .>.._K.@....k...+.P6..y..x..>.$@ ... using cached desync profile 10 wssize-cutoff reached (mode n): 8/0 . not changing wssize. not applying tampering to unknown protocol packet: id=267 reinject unmodified packet: id=268 len=1061 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 216.58.207.227 proto=tcp ttl=64 sport=51400 dport=443 flags=AP seq=1683841253 ack_seq=2007971078 TCP: len=1021 : 1F CB 4E A8 4D 25 52 8C 80 80 3E 76 7F 8F E4 6F 9A 4B A7 A3 22 C8 1D 49 92 D5 E4 2F 06 FE 83 B9 ... : ..N.M%R...>v..o.K.."..I.../.... ... using cached desync profile 10 wssize-cutoff reached (mode n): 9/0 . not changing wssize. not applying tampering to unknown protocol packet: id=268 reinject unmodified packet: id=269 len=60 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.198 proto=udp ttl=64 sport=50723 dport=443 UDP: len=32 : 42 E5 79 98 FA F8 3E EC AD D8 C9 BB F2 A4 EE ED 85 CA 0F BB 4D 21 09 A5 42 8C 46 E7 AB 14 D1 16 : B.y...>.............M!..B.F..... using cached desync profile 3 desync-cutoff reached (mode n): 15/3 . not desyncing packet: id=269 reinject unmodified packet: id=270 len=71 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 216.58.207.227 proto=tcp ttl=64 sport=51400 dport=443 flags=AP seq=1683842274 ack_seq=2007972050 TCP: len=31 : 17 03 03 00 1A 4A 4D 9C D5 32 A5 67 4E 88 2E 20 09 F7 E3 28 8D 36 30 B4 74 73 48 5B 62 60 61 : .....JM..2.gN.. ...(.60.tsH[b`a using cached desync profile 10 wssize-cutoff reached (mode n): 10/0 . not changing wssize. not applying tampering to unknown protocol packet: id=270 reinject unmodified packet: id=271 len=79 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 216.58.207.227 proto=tcp ttl=64 sport=51400 dport=443 flags=AP seq=1683842305 ack_seq=2007973502 TCP: len=39 : 17 03 03 00 22 B8 4F 43 ED 67 92 81 99 28 BA 63 9F EA 58 51 78 AD 23 FC A6 D8 CA A3 90 FF 40 9F ... : ....".OC.g...(.c..XQx.#.......@. ... using cached desync profile 10 wssize-cutoff reached (mode n): 11/0 . not changing wssize. not applying tampering to unknown protocol packet: id=271 reinject unmodified packet: id=272 len=114 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.198 proto=tcp ttl=64 sport=51401 dport=443 flags=AP seq=2455194358 ack_seq=597359972 TCP: len=74 : 14 03 03 00 01 01 17 03 03 00 3F 86 9A D6 A3 A7 DA DB 0D 23 68 6C 26 55 87 80 0E D3 49 CF 42 E8 ... : ..........?........#hl&U....I.B. ... using cached desync profile 4 not applying tampering to unknown protocol packet: id=272 reinject unmodified packet: id=273 len=1278 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=udp ttl=64 sport=51270 dport=443 UDP: len=1250 : C5 00 00 00 01 08 AD A2 C3 4D C7 61 57 9B 00 40 46 00 C8 D8 4C D9 49 88 D0 7F 17 70 08 1D 1C EB ... : .........M.aW..@F...L.I...p.... ... desync profile search for udp target=74.125.131.100:443 l7proto=unknown hostname='' desync profile 0 matches packet contains QUIC initial packet contains partial TLS ClientHello starting reassemble. now we have 1144/16384 DELAY desync until reasm is complete (#1) packet: id=273 drop packet: id=274 len=1278 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=udp ttl=64 sport=51270 dport=443 UDP: len=1250 : C7 00 00 00 01 08 AD A2 C3 4D C7 61 57 9B 00 40 46 00 C8 D8 4C D9 49 88 D0 7F 17 70 08 1D 1C EB ... : .........M.aW..@F...L.I...p.... ... using cached desync profile 0 packet contains QUIC initial reassemble : feeding data payload size=1144. now we have 2288/16384 packet contains full TLS ClientHello DELAY desync until reasm is complete (#2) REPLAYING delayed packet #1 offset 0 REPLAY IP4: 192.168.1.6 => 74.125.131.100 proto=udp ttl=64 sport=51270 dport=443 UDP: len=1250 : C5 00 00 00 01 08 AD A2 C3 4D C7 61 57 9B 00 40 46 00 C8 D8 4C D9 49 88 D0 7F 17 70 08 1D 1C EB ... : .........M.aW..@F...L.I...p.... ... using cached desync profile 0 packet contains QUIC initial packet contains full TLS ClientHello hostname: play.google.com discovered l7 protocol discovered hostname desync profile search for udp target=74.125.131.100:443 l7proto=quic hostname='play.google.com' * hostlist check for profile 3 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtubeQ.txt] include hostlist check for play.google.com : positive desync profile 3 matches desync profile changed by revealed l7 protocol or hostname ! dpi desync src=192.168.1.6:51270 dst=74.125.131.100:443 sending fake : C3 00 00 00 01 08 70 AC 9C 05 F4 9D 2B FF 03 41 D2 60 00 42 15 78 AC E2 B5 0E 80 D3 A3 E8 B2 C2 ... : ......p.....+..A.`.B.x.......... ... resending original packet with increased by 2 length DROPPING delayed packet #1 REPLAYING delayed packet #2 offset 1250 REPLAY IP4: 192.168.1.6 => 74.125.131.100 proto=udp ttl=64 sport=51270 dport=443 UDP: len=1250 : C7 00 00 00 01 08 AD A2 C3 4D C7 61 57 9B 00 40 46 00 C8 D8 4C D9 49 88 D0 7F 17 70 08 1D 1C EB ... : .........M.aW..@F...L.I...p.... ... SENDING delayed packet #2 unmodified reassemble session finished packet: id=274 drop packet: id=275 len=105 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=udp ttl=64 sport=51270 dport=443 UDP: len=77 : D8 00 00 00 01 08 AD A2 C3 4D C7 61 57 9B 00 40 3C CE 9B 79 04 DB 15 37 42 E8 72 92 89 B7 65 4B ... : .........M.aW..@<..y...7B.r...eK ... using cached desync profile 3 desync-cutoff reached (mode n): 3/3 . not desyncing packet: id=275 reinject unmodified packet: id=276 len=106 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=udp ttl=64 sport=51270 dport=443 UDP: len=78 : E4 00 00 00 01 08 ED A2 C3 4D C7 61 57 9B 00 40 3D 29 D7 D4 01 D0 2B AE 0A B6 81 37 B1 8B 04 C0 ... : .........M.aW..@=)....+....7.... ... using cached desync profile 3 desync-cutoff reached (mode n): 4/3 . not desyncing packet: id=276 reinject unmodified packet: id=277 len=59 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=udp ttl=64 sport=51270 dport=443 UDP: len=31 : 59 ED A2 C3 4D C7 61 57 9B 2E EB C7 31 C1 2F 2F 07 DF A1 DF 44 F9 EE 60 64 1A D0 6E 8B 89 8A : Y...M.aW....1.//....D..`d..n... using cached desync profile 3 desync-cutoff reached (mode n): 5/3 . not desyncing packet: id=277 reinject unmodified packet: id=278 len=1274 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=udp ttl=64 sport=51270 dport=443 UDP: len=1246 : 4A ED A2 C3 4D C7 61 57 9B 7C 27 12 AE D4 7C 67 01 AC 63 F3 E8 DD 0A 5D 72 64 6C A3 5D CA 2A 73 ... : J...M.aW.|'...|g..c....]rdl.].*s ... using cached desync profile 3 desync-cutoff reached (mode n): 6/3 . not desyncing packet: id=278 reinject unmodified packet: id=279 len=1278 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=udp ttl=64 sport=51270 dport=443 UDP: len=1250 : 53 ED A2 C3 4D C7 61 57 9B 60 5C 0B 11 D2 73 93 CC 79 35 58 3C 92 A1 94 15 2E B2 36 68 DD 96 D5 ... : S...M.aW.`\...s..y5X<......6h... ... using cached desync profile 3 desync-cutoff reached (mode n): 7/3 . not desyncing packet: id=279 reinject unmodified packet: id=280 len=1180 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=udp ttl=64 sport=51270 dport=443 UDP: len=1152 : 45 ED A2 C3 4D C7 61 57 9B 30 7D 82 DE D6 29 18 60 15 63 36 C6 EE E8 30 BE 2B 3A E2 48 86 A4 A5 ... : E...M.aW.0}...).`.c6...0.+:.H... ... using cached desync profile 3 desync-cutoff reached (mode n): 8/3 . not desyncing packet: id=280 reinject unmodified packet: id=281 len=60 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=udp ttl=64 sport=51270 dport=443 UDP: len=32 : 4A ED A2 C3 4D C7 61 57 9B CD C5 37 D8 1F 54 71 DA 4C 64 11 A1 81 9D BC FA 6D 5B D8 89 11 0F 74 : J...M.aW...7..Tq.Ld......m[....t using cached desync profile 3 desync-cutoff reached (mode n): 9/3 . not desyncing packet: id=281 reinject unmodified packet: id=282 len=63 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 74.125.131.100 proto=udp ttl=64 sport=51270 dport=443 UDP: len=35 : 5E ED A2 C3 4D C7 61 57 9B 79 7A D9 D1 1F C1 C4 D8 12 44 6E 27 7E 79 1C BA 8E 9D 19 34 D5 8A 98 ... : ^...M.aW.yz.......Dn'~y.....4... ... using cached desync profile 3 desync-cutoff reached (mode n): 10/3 . not desyncing packet: id=282 reinject unmodified packet: id=283 len=52 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 216.58.211.14 proto=tcp ttl=64 sport=51402 dport=443 flags=S seq=841977318 ack_seq=0 desync profile search for tcp target=216.58.211.14:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 216.58.211.14 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 216.58.211.14 : negative desync profile 10 matches Window size change 64240 => 1 Scale factor change 8 => 6 packet: id=283 reinject modified len=52 packet: id=284 len=52 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 216.58.211.14 => 192.168.1.6 proto=tcp ttl=57 sport=443 dport=51402 flags=SA seq=726695444 ack_seq=841977319 using cached desync profile 10 incoming TTL 57 packet: id=284 reinject unmodified packet: id=285 len=1452 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 216.58.211.14 proto=tcp ttl=64 sport=51402 dport=443 flags=A seq=841977319 ack_seq=726695445 TCP: len=1412 : 16 03 01 06 B7 01 00 06 B3 03 03 21 56 C5 82 C5 C7 08 4D CC EE DE 01 95 D6 00 7D 3B DF D7 04 25 ... : ...........!V.....M.......};...% ... using cached desync profile 10 Window size change 1025 => 1 packet contains partial TLS ClientHello starting reassemble. now we have 1412/1724 req retrans : seq interval 841977319-841978730 DELAY desync until reasm is complete (#1) packet: id=285 drop packet: id=286 len=352 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 216.58.211.14 proto=tcp ttl=64 sport=51402 dport=443 flags=AP seq=841978731 ack_seq=726695445 TCP: len=312 : 8D D3 5D EE BB 27 42 E4 16 27 F0 0E 35 6B 90 84 43 8D 4D 25 0C DF 10 5A 47 98 9C 54 E6 BF E9 55 ... : ..]..'B..'..5k..C.M%...ZG..T...U ... using cached desync profile 10 Window size change 1025 => 1 reassemble : feeding data payload size=312. now we have 1724/1724 packet contains full TLS ClientHello req retrans : seq interval 841977319-841979042 forced wssize-cutoff DELAY desync until reasm is complete (#2) REPLAYING delayed packet #1 offset 0 REPLAY IP4: 192.168.1.6 => 216.58.211.14 proto=tcp ttl=64 sport=51402 dport=443 flags=A seq=841977319 ack_seq=726695445 TCP: len=1412 : 16 03 01 06 B7 01 00 06 B3 03 03 21 56 C5 82 C5 C7 08 4D CC EE DE 01 95 D6 00 7D 3B DF D7 04 25 ... : ...........!V.....M.......};...% ... using cached desync profile 10 packet contains full TLS ClientHello hostname: ogs.google.com discovered l7 protocol discovered hostname desync profile search for tcp target=216.58.211.14:443 l7proto=tls hostname='ogs.google.com' * hostlist check for profile 1 [C:\Users\ads\Desktop\YTDisBystroold\lists\netrogat.txt] include hostlist check for ogs.google.com : negative hostlist check for google.com : negative hostlist check for com : negative * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 216.58.211.14 : negative * hostlist check for profile 4 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube.txt] include hostlist check for ogs.google.com : negative hostlist check for google.com : negative hostlist check for com : negative * hostlist check for profile 6 [C:\Users\ads\Desktop\YTDisBystroold\lists\myhostlist.txt] include hostlist check for ogs.google.com : negative hostlist check for google.com : negative hostlist check for com : negative [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-blacklist.txt] include hostlist check for ogs.google.com : negative hostlist check for google.com : negative hostlist check for com : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 216.58.211.14 : negative desync profile 10 matches dpi desync src=192.168.1.6:51402 dst=216.58.211.14:443 regular split pos: 139 normalized regular split pos : 139 seqovl : 1 sending fake(1) 1st tcp segment 0-138 len=139 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending 1st tcp segment 0-138 len=139 seqovl=1 : 00 16 03 01 06 B7 01 00 06 B3 03 03 21 56 C5 82 C5 C7 08 4D CC EE DE 01 95 D6 00 7D 3B DF D7 04 ... : ............!V.....M.......};... ... sending fake(2) 1st tcp segment 0-138 len=139 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending fake(1) 2nd tcp segment 139-1411 len=1273 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending 2nd tcp segment 139-1411 len=1273 : 6F 67 6C 65 2E 63 6F 6D 00 12 00 00 FF 01 00 01 00 44 69 00 05 00 03 02 68 32 00 17 00 00 00 1B ... : ogle.com.........Di.....h2...... ... sending fake(2) 2nd tcp segment 139-1411 len=1273 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... DROPPING delayed packet #1 REPLAYING delayed packet #2 offset 1412 REPLAY IP4: 192.168.1.6 => 216.58.211.14 proto=tcp ttl=64 sport=51402 dport=443 flags=AP seq=841978731 ack_seq=726695445 TCP: len=312 : 8D D3 5D EE BB 27 42 E4 16 27 F0 0E 35 6B 90 84 43 8D 4D 25 0C DF 10 5A 47 98 9C 54 E6 BF E9 55 ... : ..]..'B..'..5k..C.M%...ZG..T...U ... using cached desync profile 10 packet contains full TLS ClientHello hostname: ogs.google.com dpi desync src=192.168.1.6:51402 dst=216.58.211.14:443 regular split pos: 139 regular split pos is outside of this packet seqovl : 1 SENDING delayed packet #2 unmodified reassemble session finished packet: id=286 drop packet: id=287 len=1452 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 216.58.211.14 proto=tcp ttl=64 sport=51402 dport=443 flags=AP seq=841977631 ack_seq=726695445 TCP: len=1412 : B0 A3 DF 47 A5 E8 23 F9 29 F4 84 B7 BE C9 48 CD 73 8E 9B 2A 48 83 BE 74 55 75 A8 35 BF 62 85 EA ... : ...G..#.).....H.s..*H..tUu.5.b.. ... using cached desync profile 10 wssize-cutoff reached (mode n): 4/0 . not changing wssize. not applying tampering to unknown protocol packet: id=287 reinject unmodified packet: id=288 len=114 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 216.58.211.14 proto=tcp ttl=64 sport=51402 dport=443 flags=AP seq=841979043 ack_seq=726703281 TCP: len=74 : 14 03 03 00 01 01 17 03 03 00 3F 61 6A 5F 06 30 D3 E5 63 B0 D7 E9 5E 89 91 FE B6 83 69 A2 26 E5 ... : ..........?aj_.0..c...^.....i.&. ... using cached desync profile 10 wssize-cutoff reached (mode n): 5/0 . not changing wssize. not applying tampering to unknown protocol packet: id=288 reinject unmodified packet: id=289 len=132 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 216.58.211.14 proto=tcp ttl=64 sport=51402 dport=443 flags=AP seq=841979117 ack_seq=726703281 TCP: len=92 : 17 03 03 00 57 AC E0 A2 D1 2E EA 86 F5 E2 2C E0 0C AB AF 67 C0 52 42 5B DF D6 7F 1D B0 56 78 D4 ... : ....W.........,....g.RB[....Vx. ... using cached desync profile 10 wssize-cutoff reached (mode n): 6/0 . not changing wssize. not applying tampering to unknown protocol packet: id=289 reinject unmodified packet: id=290 len=1452 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 216.58.211.14 proto=tcp ttl=64 sport=51402 dport=443 flags=A seq=841979209 ack_seq=726703281 TCP: len=1412 : 17 03 03 0A E5 62 37 6D DD C9 40 63 1D AA A1 B4 86 21 35 46 CB B4 1F E6 60 4D CF 02 D4 B0 4D 0C ... : .....b7m..@c.....!5F....`M....M. ... using cached desync profile 10 wssize-cutoff reached (mode n): 7/0 . not changing wssize. not applying tampering to unknown protocol packet: id=290 reinject unmodified packet: id=291 len=1422 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 216.58.211.14 proto=tcp ttl=64 sport=51402 dport=443 flags=AP seq=841980621 ack_seq=726703281 TCP: len=1382 : AB BF 4F 09 1A 95 EC 43 7C A9 C8 DD 8D 88 AA 9A C1 88 00 51 CF 53 5F 39 9A 40 18 83 52 C1 08 9C ... : ..O....C|..........Q.S_9.@..R... ... using cached desync profile 10 wssize-cutoff reached (mode n): 8/0 . not changing wssize. not applying tampering to unknown protocol packet: id=291 reinject unmodified packet: id=292 len=71 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 216.58.211.14 proto=tcp ttl=64 sport=51402 dport=443 flags=AP seq=841982003 ack_seq=726704239 TCP: len=31 : 17 03 03 00 1A 88 5D 05 FC E2 4C 24 EF 4E AA 45 07 F2 C6 A4 2D 3D 3A 97 D1 61 58 3A 61 D4 19 : ......]...L$.N.E....-=:..aX:a.. using cached desync profile 10 wssize-cutoff reached (mode n): 9/0 . not changing wssize. not applying tampering to unknown protocol packet: id=292 reinject unmodified packet: id=293 len=79 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 216.58.211.14 proto=tcp ttl=64 sport=51402 dport=443 flags=AP seq=841982034 ack_seq=726723594 TCP: len=39 : 17 03 03 00 22 25 22 53 6C 26 8E BE 62 E9 ED A2 BF BB 00 47 38 83 E5 CA DB AD 8B 4E 1A 05 35 20 ... : ...."%"Sl&..b......G8......N..5 ... using cached desync profile 10 wssize-cutoff reached (mode n): 10/0 . not changing wssize. not applying tampering to unknown protocol packet: id=293 reinject unmodified packet: id=294 len=1278 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.132 proto=udp ttl=64 sport=49789 dport=443 UDP: len=1250 : C1 00 00 00 01 08 55 AA 12 4C 3C B4 88 6D 00 00 44 D0 4E 08 B0 07 45 FB B3 50 3E E8 B1 3E B4 8A ... : ......U..L<..m..D.N...E..P>..>.. ... desync profile search for udp target=64.233.165.132:443 l7proto=unknown hostname='' desync profile 0 matches packet contains QUIC initial packet contains partial TLS ClientHello starting reassemble. now we have 1215/16384 DELAY desync until reasm is complete (#1) packet: id=294 drop packet: id=295 len=1278 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.132 proto=udp ttl=64 sport=49789 dport=443 UDP: len=1250 : CF 00 00 00 01 08 55 AA 12 4C 3C B4 88 6D 00 00 44 D0 73 A1 6A 11 48 75 63 9E FE 60 E5 B3 1D 8C ... : ......U..L<..m..D.s.j.Huc..`.... ... using cached desync profile 0 packet contains QUIC initial reassemble : feeding data payload size=1215. now we have 2430/16384 packet contains full TLS ClientHello DELAY desync until reasm is complete (#2) REPLAYING delayed packet #1 offset 0 REPLAY IP4: 192.168.1.6 => 64.233.165.132 proto=udp ttl=64 sport=49789 dport=443 UDP: len=1250 : C1 00 00 00 01 08 55 AA 12 4C 3C B4 88 6D 00 00 44 D0 4E 08 B0 07 45 FB B3 50 3E E8 B1 3E B4 8A ... : ......U..L<..m..D.N...E..P>..>.. ... using cached desync profile 0 packet contains QUIC initial packet contains full TLS ClientHello hostname: lh3.googleusercontent.com discovered l7 protocol discovered hostname desync profile search for udp target=64.233.165.132:443 l7proto=quic hostname='lh3.googleusercontent.com' * hostlist check for profile 3 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtubeQ.txt] include hostlist check for lh3.googleusercontent.com : negative hostlist check for googleusercontent.com : negative hostlist check for com : negative * hostlist check for profile 8 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord.txt] include hostlist check for lh3.googleusercontent.com : negative hostlist check for googleusercontent.com : negative hostlist check for com : negative desync profile 0 matches dpi desync src=192.168.1.6:49789 dst=64.233.165.132:443 SENDING delayed packet #1 unmodified REPLAYING delayed packet #2 offset 1250 REPLAY IP4: 192.168.1.6 => 64.233.165.132 proto=udp ttl=64 sport=49789 dport=443 UDP: len=1250 : CF 00 00 00 01 08 55 AA 12 4C 3C B4 88 6D 00 00 44 D0 73 A1 6A 11 48 75 63 9E FE 60 E5 B3 1D 8C ... : ......U..L<..m..D.s.j.Huc..`.... ... SENDING delayed packet #2 unmodified reassemble session finished packet: id=295 drop packet: id=296 len=1278 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.164.94 proto=udp ttl=64 sport=60724 dport=443 UDP: len=1250 : C3 00 00 00 01 08 61 9C 0D 9F 7D 58 04 42 00 00 44 D0 C5 16 09 C2 67 AF E2 5B 2D B4 EB 9F 66 CE ... : ......a...}X.B..D.....g..[-...f. ... desync profile search for udp target=64.233.164.94:443 l7proto=unknown hostname='' desync profile 0 matches packet contains QUIC initial packet contains partial TLS ClientHello starting reassemble. now we have 1215/16384 DELAY desync until reasm is complete (#1) packet: id=296 drop packet: id=297 len=1278 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.164.94 proto=udp ttl=64 sport=60724 dport=443 UDP: len=1250 : C5 00 00 00 01 08 61 9C 0D 9F 7D 58 04 42 00 00 44 D0 0A 99 EB A4 2B 2E 93 6A 95 D8 F7 49 8A 8F ... : ......a...}X.B..D.....+..j...I.. ... using cached desync profile 0 packet contains QUIC initial reassemble : feeding data payload size=1215. now we have 2430/16384 packet contains full TLS ClientHello DELAY desync until reasm is complete (#2) REPLAYING delayed packet #1 offset 0 REPLAY IP4: 192.168.1.6 => 64.233.164.94 proto=udp ttl=64 sport=60724 dport=443 UDP: len=1250 : C3 00 00 00 01 08 61 9C 0D 9F 7D 58 04 42 00 00 44 D0 C5 16 09 C2 67 AF E2 5B 2D B4 EB 9F 66 CE ... : ......a...}X.B..D.....g..[-...f. ... using cached desync profile 0 packet contains QUIC initial packet contains full TLS ClientHello hostname: ssl.gstatic.com discovered l7 protocol discovered hostname desync profile search for udp target=64.233.164.94:443 l7proto=quic hostname='ssl.gstatic.com' * hostlist check for profile 3 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtubeQ.txt] include hostlist check for ssl.gstatic.com : negative hostlist check for gstatic.com : negative hostlist check for com : negative * hostlist check for profile 8 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord.txt] include hostlist check for ssl.gstatic.com : negative hostlist check for gstatic.com : negative hostlist check for com : negative desync profile 0 matches dpi desync src=192.168.1.6:60724 dst=64.233.164.94:443 SENDING delayed packet #1 unmodified REPLAYING delayed packet #2 offset 1250 REPLAY IP4: 192.168.1.6 => 64.233.164.94 proto=udp ttl=64 sport=60724 dport=443 UDP: len=1250 : C5 00 00 00 01 08 61 9C 0D 9F 7D 58 04 42 00 00 44 D0 0A 99 EB A4 2B 2E 93 6A 95 D8 F7 49 8A 8F ... : ......a...}X.B..D.....+..j...I.. ... SENDING delayed packet #2 unmodified reassemble session finished packet: id=297 drop packet: id=298 len=52 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.132 proto=tcp ttl=64 sport=51403 dport=443 flags=S seq=728484180 ack_seq=0 desync profile search for tcp target=64.233.165.132:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 64.233.165.132 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 64.233.165.132 : negative desync profile 10 matches Window size change 64240 => 1 Scale factor change 8 => 6 packet: id=298 reinject modified len=52 packet: id=299 len=1278 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.221.94 proto=udp ttl=64 sport=62687 dport=443 UDP: len=1250 : C1 00 00 00 01 08 0B 9B 02 EC 79 C7 68 4B 00 00 44 D0 10 4D 6E E5 22 73 81 9C A6 FD 80 DA B1 F5 ... : ..........y.hK..D..Mn."s........ ... desync profile search for udp target=173.194.221.94:443 l7proto=unknown hostname='' desync profile 0 matches packet contains QUIC initial packet contains partial TLS ClientHello starting reassemble. now we have 1215/16384 DELAY desync until reasm is complete (#1) packet: id=299 drop packet: id=300 len=1278 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.221.94 proto=udp ttl=64 sport=62687 dport=443 UDP: len=1250 : C4 00 00 00 01 08 0B 9B 02 EC 79 C7 68 4B 00 00 44 D0 BE 7E 85 83 43 0B B9 87 22 0B 27 74 62 06 ... : ..........y.hK..D..~..C...".'tb. ... using cached desync profile 0 packet contains QUIC initial reassemble : feeding data payload size=1215. now we have 2430/16384 packet contains full TLS ClientHello DELAY desync until reasm is complete (#2) REPLAYING delayed packet #1 offset 0 REPLAY IP4: 192.168.1.6 => 173.194.221.94 proto=udp ttl=64 sport=62687 dport=443 UDP: len=1250 : C1 00 00 00 01 08 0B 9B 02 EC 79 C7 68 4B 00 00 44 D0 10 4D 6E E5 22 73 81 9C A6 FD 80 DA B1 F5 ... : ..........y.hK..D..Mn."s........ ... using cached desync profile 0 packet contains QUIC initial packet contains full TLS ClientHello hostname: www.gstatic.com discovered l7 protocol discovered hostname desync profile search for udp target=173.194.221.94:443 l7proto=quic hostname='www.gstatic.com' * hostlist check for profile 3 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtubeQ.txt] include hostlist check for www.gstatic.com : negative hostlist check for gstatic.com : negative hostlist check for com : negative * hostlist check for profile 8 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord.txt] include hostlist check for www.gstatic.com : negative hostlist check for gstatic.com : negative hostlist check for com : negative desync profile 0 matches dpi desync src=192.168.1.6:62687 dst=173.194.221.94:443 SENDING delayed packet #1 unmodified REPLAYING delayed packet #2 offset 1250 REPLAY IP4: 192.168.1.6 => 173.194.221.94 proto=udp ttl=64 sport=62687 dport=443 UDP: len=1250 : C4 00 00 00 01 08 0B 9B 02 EC 79 C7 68 4B 00 00 44 D0 BE 7E 85 83 43 0B B9 87 22 0B 27 74 62 06 ... : ..........y.hK..D..~..C...".'tb. ... SENDING delayed packet #2 unmodified reassemble session finished packet: id=300 drop packet: id=301 len=1278 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.132 proto=udp ttl=64 sport=49789 dport=443 UDP: len=1250 : CD 00 00 00 01 08 F5 AA 12 4C 3C B4 88 6D 00 00 44 D0 1B 8A 65 EE EA CB AB 27 B9 62 95 2C 2B 57 ... : .........L<..m..D...e....'.b.,+W ... using cached desync profile 0 packet contains QUIC initial QUIC initial decryption failed. not applying tampering because desync_any_proto is not set packet: id=301 reinject unmodified packet: id=302 len=67 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.132 proto=udp ttl=64 sport=49789 dport=443 UDP: len=39 : E6 00 00 00 01 08 F5 AA 12 4C 3C B4 88 6D 00 40 16 AE 7B 22 14 C1 51 93 46 21 03 51 1C B0 E7 DC ... : .........L<..m.@..{"..Q.F!.Q.... ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=302 reinject unmodified packet: id=303 len=68 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.132 proto=udp ttl=64 sport=49789 dport=443 UDP: len=40 : E9 00 00 00 01 08 F5 AA 12 4C 3C B4 88 6D 00 40 17 84 7E 7A 7C 00 60 17 38 50 2A 84 E4 1D 9C 39 ... : .........L<..m.@..~z|.`.8P*....9 ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=303 reinject unmodified packet: id=304 len=1278 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.164.94 proto=udp ttl=64 sport=60724 dport=443 UDP: len=1250 : CB 00 00 00 01 08 E1 9C 0D 9F 7D 58 04 42 00 00 44 D0 D5 27 3A 3F 89 82 7C 76 64 F7 33 12 EA C8 ... : ..........}X.B..D..':?..|vd.3... ... using cached desync profile 0 packet contains QUIC initial QUIC initial decryption failed. not applying tampering because desync_any_proto is not set packet: id=304 reinject unmodified packet: id=305 len=67 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.164.94 proto=udp ttl=64 sport=60724 dport=443 UDP: len=39 : E9 00 00 00 01 08 E1 9C 0D 9F 7D 58 04 42 00 40 16 F1 23 0A B8 91 06 44 73 57 CB 28 E1 0B 48 FB ... : ..........}X.B.@..#....DsW.(..H. ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=305 reinject unmodified packet: id=306 len=117 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.164.94 proto=udp ttl=64 sport=60724 dport=443 UDP: len=89 : E4 00 00 00 01 08 E1 9C 0D 9F 7D 58 04 42 00 40 48 D2 02 FC 4F CE CD 15 C3 2A C5 34 EC F9 95 8A ... : ..........}X.B.@H...O....*.4.... ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=306 reinject unmodified packet: id=307 len=99 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.164.94 proto=udp ttl=64 sport=60724 dport=443 UDP: len=71 : 59 E1 9C 0D 9F 7D 58 04 42 BF 83 1D 08 1F BE E0 8C A8 F4 A8 8E C0 9D E3 11 EA 03 27 EB 84 3F 42 ... : Y....}X.B..................'..?B ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=307 reinject unmodified packet: id=308 len=52 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 64.233.165.132 => 192.168.1.6 proto=tcp ttl=120 sport=443 dport=51403 flags=SA seq=2705518477 ack_seq=728484181 using cached desync profile 10 incoming TTL 120 packet: id=308 reinject unmodified packet: id=309 len=65 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.132 proto=udp ttl=64 sport=49789 dport=443 UDP: len=37 : E6 00 00 00 01 08 F5 AA 12 4C 3C B4 88 6D 00 40 14 52 CD 7B 33 26 14 20 1B 68 92 8F 67 CD 5D F9 ... : .........L<..m.@.R.{3&. .h..g.]. ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=309 reinject unmodified packet: id=310 len=60 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.164.94 proto=udp ttl=64 sport=60724 dport=443 UDP: len=32 : 45 E1 9C 0D 9F 7D 58 04 42 2F FC 66 62 A9 EE 6A AD 62 6E 0D 05 A3 06 46 D2 A8 33 B8 88 2F A5 44 : E....}X.B/.fb..j.bn....F..3../.D using cached desync profile 0 not applying tampering to unknown protocol packet: id=310 reinject unmodified packet: id=311 len=1278 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.221.94 proto=udp ttl=64 sport=62687 dport=443 UDP: len=1250 : CC 00 00 00 01 08 EB 9B 02 EC 79 C7 68 4B 00 00 44 D0 71 FF D9 A2 E7 E9 AC C8 CD 7E 64 71 D8 AE ... : ..........y.hK..D.q........~dq.. ... using cached desync profile 0 packet contains QUIC initial QUIC initial decryption failed. not applying tampering because desync_any_proto is not set packet: id=311 reinject unmodified packet: id=312 len=67 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.221.94 proto=udp ttl=64 sport=62687 dport=443 UDP: len=39 : E9 00 00 00 01 08 EB 9B 02 EC 79 C7 68 4B 00 40 16 CD 71 B3 3B 92 C7 ED 1F 92 6D 37 A8 22 E8 4C ... : ..........y.hK.@..q.;.....m7.".L ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=312 reinject unmodified packet: id=313 len=117 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.221.94 proto=udp ttl=64 sport=62687 dport=443 UDP: len=89 : E7 00 00 00 01 08 EB 9B 02 EC 79 C7 68 4B 00 40 48 52 BF 94 33 E0 E2 29 F4 53 D0 B7 35 13 6A 6F ... : ..........y.hK.@HR..3..).S..5.jo ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=313 reinject unmodified packet: id=314 len=100 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.221.94 proto=udp ttl=64 sport=62687 dport=443 UDP: len=72 : 44 EB 9B 02 EC 79 C7 68 4B EE 4A 37 55 7A 3F A8 77 0F 57 1D 23 A0 11 91 DA 5F F8 81 24 82 5D C3 ... : D....y.hK.J7Uz?.w.W.#...._..$.]. ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=314 reinject unmodified packet: id=315 len=117 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.132 proto=udp ttl=64 sport=49789 dport=443 UDP: len=89 : E7 00 00 00 01 08 F5 AA 12 4C 3C B4 88 6D 00 40 48 33 0A F3 89 05 3D F8 80 F5 C3 C2 66 BC 01 DC ... : .........L<..m.@H3....=.....f... ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=315 reinject unmodified packet: id=316 len=101 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.132 proto=udp ttl=64 sport=49789 dport=443 UDP: len=73 : 43 F5 AA 12 4C 3C B4 88 6D 5B F2 DE 5F 48 86 CE 43 58 02 B5 DA E8 16 94 E8 9C 9D F9 DD 9A 58 99 ... : C...L<..m[.._H..CX............X. ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=316 reinject unmodified packet: id=317 len=1274 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.132 proto=udp ttl=64 sport=49789 dport=443 UDP: len=1246 : 58 F5 AA 12 4C 3C B4 88 6D A6 AF AF C8 30 33 93 36 96 0F ED 30 6E 2F 9F BE 88 E7 CE D7 F6 26 25 ... : X...L<..m....03.6...0n/.......&% ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=317 reinject unmodified packet: id=318 len=155 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.132 proto=udp ttl=64 sport=49789 dport=443 UDP: len=127 : 5F F5 AA 12 4C 3C B4 88 6D 0D B8 31 DC 75 F4 2E 5A CA EB A0 B6 A0 75 36 6E F3 7A 0B A4 CE 0F 68 ... : _...L<..m..1.u..Z.....u6n.z....h ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=318 reinject unmodified packet: id=319 len=60 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.221.94 proto=udp ttl=64 sport=62687 dport=443 UDP: len=32 : 5F EB 9B 02 EC 79 C7 68 4B C8 B3 24 B2 91 98 AB C5 95 92 DA 41 1A 79 46 51 6D 5E 36 53 E6 67 6E : _....y.hK..$........A.yFQm^6S.gn using cached desync profile 0 not applying tampering to unknown protocol packet: id=319 reinject unmodified packet: id=320 len=1452 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.132 proto=tcp ttl=64 sport=51403 dport=443 flags=A seq=728484181 ack_seq=2705518478 TCP: len=1412 : 16 03 01 08 D3 01 00 08 CF 03 03 D5 8D 8B 5E 46 A0 F3 12 A9 EF 41 25 45 74 3F D2 DD B0 8C 30 DC ... : ..............^F.....A%Et?....0. ... using cached desync profile 10 Window size change 1025 => 1 packet contains partial TLS ClientHello starting reassemble. now we have 1412/2264 req retrans : seq interval 728484181-728485592 DELAY desync until reasm is complete (#1) packet: id=320 drop packet: id=321 len=892 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.132 proto=tcp ttl=64 sport=51403 dport=443 flags=AP seq=728485593 ack_seq=2705518478 TCP: len=852 : C1 B9 D8 72 C4 69 A4 4C A8 43 16 08 81 90 EA 0D 09 92 0F 01 40 B5 FA 3A 75 A8 B3 4D 76 A2 1D 03 ... : ...r.i.L.C..........@..:u..Mv... ... using cached desync profile 10 Window size change 1025 => 1 reassemble : feeding data payload size=852. now we have 2264/2264 packet contains full TLS ClientHello req retrans : seq interval 728484181-728486444 forced wssize-cutoff DELAY desync until reasm is complete (#2) REPLAYING delayed packet #1 offset 0 REPLAY IP4: 192.168.1.6 => 64.233.165.132 proto=tcp ttl=64 sport=51403 dport=443 flags=A seq=728484181 ack_seq=2705518478 TCP: len=1412 : 16 03 01 08 D3 01 00 08 CF 03 03 D5 8D 8B 5E 46 A0 F3 12 A9 EF 41 25 45 74 3F D2 DD B0 8C 30 DC ... : ..............^F.....A%Et?....0. ... using cached desync profile 10 packet contains full TLS ClientHello hostname: lh3.googleusercontent.com discovered l7 protocol discovered hostname desync profile search for tcp target=64.233.165.132:443 l7proto=tls hostname='lh3.googleusercontent.com' * hostlist check for profile 1 [C:\Users\ads\Desktop\YTDisBystroold\lists\netrogat.txt] include hostlist check for lh3.googleusercontent.com : negative hostlist check for googleusercontent.com : negative hostlist check for com : negative * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 64.233.165.132 : negative * hostlist check for profile 4 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube.txt] include hostlist check for lh3.googleusercontent.com : negative hostlist check for googleusercontent.com : negative hostlist check for com : negative * hostlist check for profile 6 [C:\Users\ads\Desktop\YTDisBystroold\lists\myhostlist.txt] include hostlist check for lh3.googleusercontent.com : negative hostlist check for googleusercontent.com : negative hostlist check for com : negative [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-blacklist.txt] include hostlist check for lh3.googleusercontent.com : negative hostlist check for googleusercontent.com : negative hostlist check for com : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 64.233.165.132 : negative desync profile 10 matches dpi desync src=192.168.1.6:51403 dst=64.233.165.132:443 regular split pos: 419 normalized regular split pos : 419 seqovl : 1 sending fake(1) 1st tcp segment 0-418 len=419 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending 1st tcp segment 0-418 len=419 seqovl=1 : 00 16 03 01 08 D3 01 00 08 CF 03 03 D5 8D 8B 5E 46 A0 F3 12 A9 EF 41 25 45 74 3F D2 DD B0 8C 30 ... : ...............^F.....A%Et?....0 ... sending fake(2) 1st tcp segment 0-418 len=419 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending fake(1) 2nd tcp segment 419-1411 len=993 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending 2nd tcp segment 419-1411 len=993 : 73 65 72 63 6F 6E 74 65 6E 74 2E 63 6F 6D 00 33 04 EF 04 ED EA EA 00 01 00 63 99 04 C0 C7 71 04 ... : sercontent.com.3.........c....q. ... sending fake(2) 2nd tcp segment 419-1411 len=993 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... DROPPING delayed packet #1 REPLAYING delayed packet #2 offset 1412 REPLAY IP4: 192.168.1.6 => 64.233.165.132 proto=tcp ttl=64 sport=51403 dport=443 flags=AP seq=728485593 ack_seq=2705518478 TCP: len=852 : C1 B9 D8 72 C4 69 A4 4C A8 43 16 08 81 90 EA 0D 09 92 0F 01 40 B5 FA 3A 75 A8 B3 4D 76 A2 1D 03 ... : ...r.i.L.C..........@..:u..Mv... ... using cached desync profile 10 packet contains full TLS ClientHello hostname: lh3.googleusercontent.com dpi desync src=192.168.1.6:51403 dst=64.233.165.132:443 regular split pos: 419 regular split pos is outside of this packet seqovl : 1 SENDING delayed packet #2 unmodified reassemble session finished packet: id=321 drop packet: id=322 len=59 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.164.94 proto=udp ttl=64 sport=60724 dport=443 UDP: len=31 : 47 E1 9C 0D 9F 7D 58 04 42 67 2C EB 37 54 B9 DF 66 4E 8C 32 B9 6A 71 32 55 56 02 CB AC 05 7C : G....}X.Bg,.7T..fN.2.jq2UV....| using cached desync profile 0 not applying tampering to unknown protocol packet: id=322 reinject unmodified packet: id=323 len=198 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.132 proto=udp ttl=64 sport=49789 dport=443 UDP: len=170 : EA 00 00 00 01 08 F5 AA 12 4C 3C B4 88 6D 00 40 49 71 55 D5 B9 8A CB BB 7A 5F 29 75 C5 9A 4A 00 ... : .........L<..m.@IqU.....z_)u..J. ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=323 reinject unmodified packet: id=324 len=190 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.221.94 proto=udp ttl=64 sport=62687 dport=443 UDP: len=162 : E8 00 00 00 01 08 EB 9B 02 EC 79 C7 68 4B 00 40 49 B8 26 63 73 1E 68 34 33 DC F3 B2 92 CD BF 57 ... : ..........y.hK.@I.&cs.h43......W ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=324 reinject unmodified packet: id=325 len=61 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.221.94 proto=udp ttl=64 sport=62687 dport=443 UDP: len=33 : 43 EB 9B 02 EC 79 C7 68 4B 1F 19 12 66 69 08 04 F6 0D 08 B6 95 0A 88 20 FE 6F 0A 26 CE 1D 00 AD ... : C....y.hK...fi......... .o.&.... ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=325 reinject unmodified packet: id=326 len=61 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.221.94 proto=udp ttl=64 sport=62687 dport=443 UDP: len=33 : 5C EB 9B 02 EC 79 C7 68 4B 85 C2 3A C0 AB BB E7 FA 04 63 40 45 8D FC 78 43 7D A0 8D 93 ED EB 79 ... : \....y.hK..:......c@E..xC}.....y ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=326 reinject unmodified packet: id=327 len=61 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.132 proto=udp ttl=64 sport=49789 dport=443 UDP: len=33 : 5D F5 AA 12 4C 3C B4 88 6D DD 56 9D 3A DD F6 D4 D7 A7 B0 8F 2A 15 25 06 FE 6F ED AF DB 8E 3E 56 ... : ]...L<..m.V.:.......*.%..o....>V ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=327 reinject unmodified packet: id=328 len=61 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.132 proto=udp ttl=64 sport=49789 dport=443 UDP: len=33 : 46 F5 AA 12 4C 3C B4 88 6D 21 58 98 89 41 BD 08 08 87 16 1C FF 00 2F 31 22 FE 73 46 1A 13 CF 2E ... : F...L<..m!X..A......../1".sF.... ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=328 reinject unmodified packet: id=329 len=61 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.164.94 proto=udp ttl=64 sport=60724 dport=443 UDP: len=33 : 57 E1 9C 0D 9F 7D 58 04 42 28 15 41 A0 7C 9A 39 01 99 64 7C 67 98 B0 E5 33 3B DD CB 90 6E 47 0C ... : W....}X.B(.A.|.9..d|g...3;...nG. ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=329 reinject unmodified packet: id=330 len=62 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.132 proto=udp ttl=64 sport=49789 dport=443 UDP: len=34 : 5C F5 AA 12 4C 3C B4 88 6D 65 61 F8 F5 20 DA 1C FE C0 A5 C0 31 F3 3C 21 83 F9 B9 DD 85 12 27 6D ... : \...L<..mea.. ......1. 173.194.221.94 proto=udp ttl=64 sport=62687 dport=443 UDP: len=29 : 5F EB 9B 02 EC 79 C7 68 4B 2E 8C F2 8A 8C 72 EF 7C AC E4 69 BE DE 18 82 AD E6 A3 D8 20 : _....y.hK.....r.|..i........ using cached desync profile 0 not applying tampering to unknown protocol packet: id=331 reinject unmodified packet: id=332 len=63 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.132 proto=udp ttl=64 sport=49789 dport=443 UDP: len=35 : 56 F5 AA 12 4C 3C B4 88 6D 53 8B 96 86 68 1D DF 5F 34 12 37 BF C9 1E 58 37 99 D5 C5 59 76 BB 8E ... : V...L<..mS...h.._4.7...X7...Yv.. ... using cached desync profile 0 not applying tampering to unknown protocol packet: id=332 reinject unmodified packet: id=333 len=59 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.132 proto=udp ttl=64 sport=49789 dport=443 UDP: len=31 : 40 F5 AA 12 4C 3C B4 88 6D 84 83 79 CB B4 41 15 D8 ED 16 E8 1C E1 43 43 A2 AC 5C 2F D4 8F A0 : @...L<..m..y..A.......CC..\/... using cached desync profile 0 not applying tampering to unknown protocol packet: id=333 reinject unmodified packet: id=334 len=59 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.132 proto=udp ttl=64 sport=49789 dport=443 UDP: len=31 : 51 F5 AA 12 4C 3C B4 88 6D 8B 85 12 33 E7 F4 96 5A 05 75 12 A2 00 83 65 41 55 21 3A 47 6B 7D : Q...L<..m...3...Z.u....eAU!:Gk} using cached desync profile 0 not applying tampering to unknown protocol packet: id=334 reinject unmodified packet: id=335 len=59 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.132 proto=udp ttl=64 sport=49789 dport=443 UDP: len=31 : 50 F5 AA 12 4C 3C B4 88 6D 1D 86 1E 29 E9 88 DD 81 5A 94 58 27 8C 21 36 F2 5C 7A A3 3E 2E D9 : P...L<..m...)....Z.X'.!6.\z.>.. using cached desync profile 0 not applying tampering to unknown protocol packet: id=335 reinject unmodified packet: id=336 len=59 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.132 proto=udp ttl=64 sport=49789 dport=443 UDP: len=31 : 50 F5 AA 12 4C 3C B4 88 6D AA 7D E1 9F B2 8A 3A A0 14 2A 30 59 18 A1 84 7D 47 22 AF FF 88 80 : P...L<..m.}....:..*0Y...}G".... using cached desync profile 0 not applying tampering to unknown protocol packet: id=336 reinject unmodified packet: id=337 len=59 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.132 proto=udp ttl=64 sport=49789 dport=443 UDP: len=31 : 41 F5 AA 12 4C 3C B4 88 6D 71 43 48 89 23 69 12 94 35 7B 61 88 A4 34 80 2C 98 83 60 F2 D6 FC : A...L<..mqCH.#i..5{a..4.,..`... using cached desync profile 0 not applying tampering to unknown protocol packet: id=337 reinject unmodified packet: id=338 len=59 outbound IPv6=0 IPChecksum=1 TCPChecksum=1 UDPChecksum=0 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.132 proto=udp ttl=64 sport=49789 dport=443 UDP: len=31 : 5E F5 AA 12 4C 3C B4 88 6D ED 62 EA B1 E3 85 E6 96 C9 84 36 E5 37 C9 B7 B4 F7 2B C8 12 A7 AB : ^...L<..m.b........6.7....+.... using cached desync profile 0 not applying tampering to unknown protocol packet: id=338 reinject unmodified packet: id=339 len=114 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 64.233.165.132 proto=tcp ttl=64 sport=51403 dport=443 flags=AP seq=728486445 ack_seq=2705519952 TCP: len=74 : 14 03 03 00 01 01 17 03 03 00 3F DE 1F 2F 26 30 C4 11 20 F0 E8 12 F8 80 56 1D 7C 07 3D AE 19 6F ... : ..........?../&0.. .....V.|.=..o ... using cached desync profile 10 wssize-cutoff reached (mode n): 4/0 . not changing wssize. not applying tampering to unknown protocol packet: id=339 reinject unmodified packet: id=340 len=52 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.220.95 proto=tcp ttl=64 sport=51405 dport=443 flags=S seq=908048991 ack_seq=0 desync profile search for tcp target=173.194.220.95:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 173.194.220.95 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 173.194.220.95 : negative desync profile 10 matches Window size change 64240 => 1 Scale factor change 8 => 6 packet: id=340 reinject modified len=52 packet: id=341 len=52 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 173.194.220.95 => 192.168.1.6 proto=tcp ttl=122 sport=443 dport=51405 flags=SA seq=1090746212 ack_seq=908048992 using cached desync profile 10 incoming TTL 122 packet: id=341 reinject unmodified packet: id=342 len=1452 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.220.95 proto=tcp ttl=64 sport=51405 dport=443 flags=A seq=908048992 ack_seq=1090746213 TCP: len=1412 : 16 03 01 07 2C 01 00 07 28 03 03 6A BD FC CC 5F CB E3 EA ED C6 88 3B AD 33 BB D6 FC 9B 43 B5 9B ... : ....,...(..j..._......;.3....C.. ... using cached desync profile 10 Window size change 1025 => 1 packet contains partial TLS ClientHello starting reassemble. now we have 1412/1841 req retrans : seq interval 908048992-908050403 DELAY desync until reasm is complete (#1) packet: id=342 drop packet: id=343 len=469 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.220.95 proto=tcp ttl=64 sport=51405 dport=443 flags=AP seq=908050404 ack_seq=1090746213 TCP: len=429 : 3C 42 7B E9 5E 7A 45 5E 20 B9 AE 92 20 56 74 39 9A 56 9C E7 21 5D 69 5C DC 69 72 7D 00 F0 83 55 ... : 1 reassemble : feeding data payload size=429. now we have 1841/1841 packet contains full TLS ClientHello req retrans : seq interval 908048992-908050832 forced wssize-cutoff DELAY desync until reasm is complete (#2) REPLAYING delayed packet #1 offset 0 REPLAY IP4: 192.168.1.6 => 173.194.220.95 proto=tcp ttl=64 sport=51405 dport=443 flags=A seq=908048992 ack_seq=1090746213 TCP: len=1412 : 16 03 01 07 2C 01 00 07 28 03 03 6A BD FC CC 5F CB E3 EA ED C6 88 3B AD 33 BB D6 FC 9B 43 B5 9B ... : ....,...(..j..._......;.3....C.. ... using cached desync profile 10 packet contains full TLS ClientHello hostname: optimizationguide-pa.googleapis.com discovered l7 protocol discovered hostname desync profile search for tcp target=173.194.220.95:443 l7proto=tls hostname='optimizationguide-pa.googleapis.com' * hostlist check for profile 1 [C:\Users\ads\Desktop\YTDisBystroold\lists\netrogat.txt] include hostlist check for optimizationguide-pa.googleapis.com : negative hostlist check for googleapis.com : negative hostlist check for com : negative * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 173.194.220.95 : negative * hostlist check for profile 4 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube.txt] include hostlist check for optimizationguide-pa.googleapis.com : negative hostlist check for googleapis.com : negative hostlist check for com : negative * hostlist check for profile 6 [C:\Users\ads\Desktop\YTDisBystroold\lists\myhostlist.txt] include hostlist check for optimizationguide-pa.googleapis.com : negative hostlist check for googleapis.com : negative hostlist check for com : negative [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-blacklist.txt] include hostlist check for optimizationguide-pa.googleapis.com : negative hostlist check for googleapis.com : negative hostlist check for com : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 173.194.220.95 : negative desync profile 10 matches dpi desync src=192.168.1.6:51405 dst=173.194.220.95:443 regular split pos: 1822 regular split pos is outside of this packet seqovl : 1 SENDING delayed packet #1 unmodified REPLAYING delayed packet #2 offset 1412 REPLAY IP4: 192.168.1.6 => 173.194.220.95 proto=tcp ttl=64 sport=51405 dport=443 flags=AP seq=908050404 ack_seq=1090746213 TCP: len=429 : 3C 42 7B E9 5E 7A 45 5E 20 B9 AE 92 20 56 74 39 9A 56 9C E7 21 5D 69 5C DC 69 72 7D 00 F0 83 55 ... : 173.194.220.95 proto=tcp ttl=64 sport=51405 dport=443 flags=AP seq=908050833 ack_seq=1090751979 TCP: len=74 : 14 03 03 00 01 01 17 03 03 00 3F EF 27 11 BC DD 6E AE 37 EE 1B 14 CF 96 77 CB DB 96 EC 4E 7C 34 ... : ..........?.'...n.7.....w....N|4 ... using cached desync profile 10 wssize-cutoff reached (mode n): 4/0 . not changing wssize. not applying tampering to unknown protocol packet: id=344 reinject unmodified packet: id=345 len=132 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.220.95 proto=tcp ttl=64 sport=51405 dport=443 flags=AP seq=908050907 ack_seq=1090751979 TCP: len=92 : 17 03 03 00 57 4C E1 60 8C 01 E6 58 51 60 63 EF BC BD E8 B9 C6 16 C4 D1 81 30 1A 50 0F E3 DA CE ... : ....WL.`...XQ`c..........0.P.... ... using cached desync profile 10 wssize-cutoff reached (mode n): 5/0 . not changing wssize. not applying tampering to unknown protocol packet: id=345 reinject unmodified packet: id=346 len=453 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.220.95 proto=tcp ttl=64 sport=51405 dport=443 flags=AP seq=908050999 ack_seq=1090751979 TCP: len=413 : 17 03 03 01 98 54 51 50 97 8F CA 86 24 16 BE DC D4 82 02 51 CF DB BA B2 39 43 5D B9 A4 E6 CD 72 ... : .....TQP....$......Q....9C]....r ... using cached desync profile 10 wssize-cutoff reached (mode n): 6/0 . not changing wssize. not applying tampering to unknown protocol packet: id=346 reinject unmodified packet: id=347 len=1100 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.220.95 proto=tcp ttl=64 sport=51405 dport=443 flags=AP seq=908051412 ack_seq=1090751979 TCP: len=1060 : 17 03 03 04 1F 52 04 1F 0B 52 8C 59 45 D7 40 20 25 84 B5 F7 0A BF D1 94 A0 82 70 16 81 A5 A3 9A ... : .....R...R.YE.@ %.........p..... ... using cached desync profile 10 wssize-cutoff reached (mode n): 7/0 . not changing wssize. not applying tampering to unknown protocol packet: id=347 reinject unmodified packet: id=348 len=71 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.220.95 proto=tcp ttl=64 sport=51405 dport=443 flags=AP seq=908052472 ack_seq=1090752979 TCP: len=31 : 17 03 03 00 1A 41 18 61 2B F7 9C 69 12 D2 47 F2 81 E1 18 BC 01 59 68 F9 2C BD FF CC 9F B2 F1 : .....A.a+..i..G......Yh.,...... using cached desync profile 10 wssize-cutoff reached (mode n): 8/0 . not changing wssize. not applying tampering to unknown protocol packet: id=348 reinject unmodified packet: id=349 len=79 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 173.194.220.95 proto=tcp ttl=64 sport=51405 dport=443 flags=AP seq=908052503 ack_seq=1090755952 TCP: len=39 : 17 03 03 00 22 19 13 72 79 A8 3C D7 5F 9F 33 3F CF E2 51 36 C6 FD FD 5F 56 4A 45 91 0E 8E 38 99 ... : ...."..ry.<._.3?..Q6..._VJE...8. ... using cached desync profile 10 wssize-cutoff reached (mode n): 9/0 . not changing wssize. not applying tampering to unknown protocol packet: id=349 reinject unmodified packet: id=350 len=41 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 34.107.221.82 proto=tcp ttl=64 sport=51368 dport=80 flags=A seq=3571870220 ack_seq=3055136677 TCP: len=1 : 00 : . desync profile search for tcp target=34.107.221.82:80 l7proto=unknown hostname='' desync profile 0 matches not applying tampering to unknown protocol packet: id=350 reinject unmodified packet: id=351 len=41 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 34.107.221.82 proto=tcp ttl=64 sport=51361 dport=80 flags=A seq=1602401641 ack_seq=2961765197 TCP: len=1 : 00 : . desync profile search for tcp target=34.107.221.82:80 l7proto=unknown hostname='' desync profile 0 matches not applying tampering to unknown protocol packet: id=351 reinject unmodified packet: id=352 len=52 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 45.112.195.82 proto=tcp ttl=64 sport=51406 dport=443 flags=S seq=476086508 ack_seq=0 desync profile search for tcp target=45.112.195.82:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 45.112.195.82 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 45.112.195.82 : negative desync profile 10 matches Window size change 64240 => 1 Scale factor change 8 => 6 packet: id=352 reinject modified len=52 packet: id=353 len=52 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 45.112.195.82 => 192.168.1.6 proto=tcp ttl=48 sport=443 dport=51406 flags=SA seq=4062660771 ack_seq=476086509 using cached desync profile 10 incoming TTL 48 packet: id=353 reinject unmodified packet: id=354 len=1500 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 45.112.195.82 proto=tcp ttl=64 sport=51406 dport=443 flags=A seq=476086509 ack_seq=4062660772 TCP: len=1460 : 16 03 01 06 FF 01 00 06 FB 03 03 54 8C B4 69 A3 F0 A5 D9 F8 A1 36 2B 8F 6B B9 CC 15 C3 9A C9 D1 ... : ...........T..i......6+.k....... ... using cached desync profile 10 Window size change 1026 => 1 packet contains partial TLS ClientHello starting reassemble. now we have 1460/1796 req retrans : seq interval 476086509-476087968 DELAY desync until reasm is complete (#1) packet: id=354 drop packet: id=355 len=376 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 45.112.195.82 proto=tcp ttl=64 sport=51406 dport=443 flags=AP seq=476087969 ack_seq=4062660772 TCP: len=336 : 04 03 08 04 04 01 05 03 08 05 05 01 08 06 06 01 00 2B 00 07 06 3A 3A 03 04 03 03 FF 01 00 01 00 ... : .................+...::......... ... using cached desync profile 10 Window size change 1026 => 1 reassemble : feeding data payload size=336. now we have 1796/1796 packet contains full TLS ClientHello req retrans : seq interval 476086509-476088304 forced wssize-cutoff DELAY desync until reasm is complete (#2) REPLAYING delayed packet #1 offset 0 REPLAY IP4: 192.168.1.6 => 45.112.195.82 proto=tcp ttl=64 sport=51406 dport=443 flags=A seq=476086509 ack_seq=4062660772 TCP: len=1460 : 16 03 01 06 FF 01 00 06 FB 03 03 54 8C B4 69 A3 F0 A5 D9 F8 A1 36 2B 8F 6B B9 CC 15 C3 9A C9 D1 ... : ...........T..i......6+.k....... ... using cached desync profile 10 packet contains full TLS ClientHello hostname: rp.ru.yt6.matchnet.xyz discovered l7 protocol discovered hostname desync profile search for tcp target=45.112.195.82:443 l7proto=tls hostname='rp.ru.yt6.matchnet.xyz' * hostlist check for profile 1 [C:\Users\ads\Desktop\YTDisBystroold\lists\netrogat.txt] include hostlist check for rp.ru.yt6.matchnet.xyz : negative hostlist check for ru.yt6.matchnet.xyz : negative hostlist check for yt6.matchnet.xyz : negative hostlist check for matchnet.xyz : negative hostlist check for xyz : negative * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 45.112.195.82 : negative * hostlist check for profile 4 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube.txt] include hostlist check for rp.ru.yt6.matchnet.xyz : negative hostlist check for ru.yt6.matchnet.xyz : negative hostlist check for yt6.matchnet.xyz : negative hostlist check for matchnet.xyz : negative hostlist check for xyz : negative * hostlist check for profile 6 [C:\Users\ads\Desktop\YTDisBystroold\lists\myhostlist.txt] include hostlist check for rp.ru.yt6.matchnet.xyz : negative hostlist check for ru.yt6.matchnet.xyz : negative hostlist check for yt6.matchnet.xyz : negative hostlist check for matchnet.xyz : negative hostlist check for xyz : negative [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-blacklist.txt] include hostlist check for rp.ru.yt6.matchnet.xyz : negative hostlist check for ru.yt6.matchnet.xyz : negative hostlist check for yt6.matchnet.xyz : negative hostlist check for matchnet.xyz : negative hostlist check for xyz : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 45.112.195.82 : negative desync profile 10 matches dpi desync src=192.168.1.6:51406 dst=45.112.195.82:443 regular split pos: 169 normalized regular split pos : 169 seqovl : 1 sending fake(1) 1st tcp segment 0-168 len=169 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending 1st tcp segment 0-168 len=169 seqovl=1 : 00 16 03 01 06 FF 01 00 06 FB 03 03 54 8C B4 69 A3 F0 A5 D9 F8 A1 36 2B 8F 6B B9 CC 15 C3 9A C9 ... : ............T..i......6+.k...... ... sending fake(2) 1st tcp segment 0-168 len=169 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending fake(1) 2nd tcp segment 169-1459 len=1291 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending 2nd tcp segment 169-1459 len=1291 : 63 68 6E 65 74 2E 78 79 7A 00 33 04 EF 04 ED 9A 9A 00 01 00 63 99 04 C0 4C 32 9E D8 25 7F C6 C7 ... : chnet.xyz.3.........c...L2..%.. ... sending fake(2) 2nd tcp segment 169-1459 len=1291 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... DROPPING delayed packet #1 REPLAYING delayed packet #2 offset 1460 REPLAY IP4: 192.168.1.6 => 45.112.195.82 proto=tcp ttl=64 sport=51406 dport=443 flags=AP seq=476087969 ack_seq=4062660772 TCP: len=336 : 04 03 08 04 04 01 05 03 08 05 05 01 08 06 06 01 00 2B 00 07 06 3A 3A 03 04 03 03 FF 01 00 01 00 ... : .................+...::......... ... using cached desync profile 10 packet contains full TLS ClientHello hostname: rp.ru.yt6.matchnet.xyz dpi desync src=192.168.1.6:51406 dst=45.112.195.82:443 regular split pos: 169 regular split pos is outside of this packet seqovl : 1 SENDING delayed packet #2 unmodified reassemble session finished packet: id=355 drop packet: id=356 len=104 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 45.112.195.82 proto=tcp ttl=64 sport=51406 dport=443 flags=AP seq=476088305 ack_seq=4062663160 TCP: len=64 : 14 03 03 00 01 01 17 03 03 00 35 F8 78 12 C7 58 AA E1 2D 73 A9 C6 82 55 31 8D 4D 09 EF 0A B8 4D ... : ..........5.x..X..-s...U1.M....M ... using cached desync profile 10 wssize-cutoff reached (mode n): 4/0 . not changing wssize. not applying tampering to unknown protocol packet: id=356 reinject unmodified packet: id=357 len=402 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 45.112.195.82 proto=tcp ttl=64 sport=51406 dport=443 flags=AP seq=476088369 ack_seq=4062663160 TCP: len=362 : 17 03 03 01 65 66 76 42 0C 71 52 44 85 DA 72 01 97 75 CC AB 0A F3 F3 E5 81 70 13 ED 49 BE DB F9 ... : ....efvB.qRD..r..u.......p..I... ... using cached desync profile 10 wssize-cutoff reached (mode n): 5/0 . not changing wssize. not applying tampering to unknown protocol packet: id=357 reinject unmodified packet: id=358 len=475 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 45.112.195.82 proto=tcp ttl=64 sport=51406 dport=443 flags=AP seq=476088731 ack_seq=4062664022 TCP: len=435 : 17 03 03 01 AE 7E C3 FF B1 D5 78 39 8A 57 7C 92 B5 55 6A D0 E3 30 04 5C 0C 24 BB B5 7F 2A FE 3B ... : .....~....x9.W|..Uj..0.\.$..*.; ... using cached desync profile 10 wssize-cutoff reached (mode n): 6/0 . not changing wssize. not applying tampering to unknown protocol packet: id=358 reinject unmodified packet: id=359 len=52 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 109.206.241.91 proto=tcp ttl=64 sport=51407 dport=443 flags=S seq=3525856660 ack_seq=0 desync profile search for tcp target=109.206.241.91:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 109.206.241.91 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 109.206.241.91 : negative desync profile 10 matches Window size change 64240 => 1 Scale factor change 8 => 6 packet: id=359 reinject modified len=52 packet: id=360 len=52 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 109.206.241.91 => 192.168.1.6 proto=tcp ttl=52 sport=443 dport=51407 flags=SA seq=3679923526 ack_seq=3525856661 using cached desync profile 10 incoming TTL 52 packet: id=360 reinject unmodified packet: id=361 len=1500 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 109.206.241.91 proto=tcp ttl=64 sport=51407 dport=443 flags=A seq=3525856661 ack_seq=3679923527 TCP: len=1460 : 16 03 01 06 BE 01 00 06 BA 03 03 D2 D0 11 17 53 75 13 58 35 65 FF 65 E4 93 12 F3 7C 9C 6F 7E BB ... : ...............Su.X5e.e....|.o~. ... using cached desync profile 10 Window size change 1026 => 1 packet contains partial TLS ClientHello starting reassemble. now we have 1460/1731 req retrans : seq interval 3525856661-3525858120 DELAY desync until reasm is complete (#1) packet: id=361 drop packet: id=362 len=311 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 109.206.241.91 proto=tcp ttl=64 sport=51407 dport=443 flags=AP seq=3525858121 ack_seq=3679923527 TCP: len=271 : C8 43 6E F4 3A 01 24 AC 7E 8A 6F 68 7B 57 07 1C 64 C7 B0 0F 1C AB 12 D1 5C 98 F8 25 70 A3 F6 30 ... : .Cn.:.$.~.oh{W..d.......\..%p..0 ... using cached desync profile 10 Window size change 1026 => 1 reassemble : feeding data payload size=271. now we have 1731/1731 packet contains full TLS ClientHello req retrans : seq interval 3525856661-3525858391 forced wssize-cutoff DELAY desync until reasm is complete (#2) REPLAYING delayed packet #1 offset 0 REPLAY IP4: 192.168.1.6 => 109.206.241.91 proto=tcp ttl=64 sport=51407 dport=443 flags=A seq=3525856661 ack_seq=3679923527 TCP: len=1460 : 16 03 01 06 BE 01 00 06 BA 03 03 D2 D0 11 17 53 75 13 58 35 65 FF 65 E4 93 12 F3 7C 9C 6F 7E BB ... : ...............Su.X5e.e....|.o~. ... using cached desync profile 10 packet contains full TLS ClientHello hostname: rp.ru.ee.matchnet.xyz discovered l7 protocol discovered hostname desync profile search for tcp target=109.206.241.91:443 l7proto=tls hostname='rp.ru.ee.matchnet.xyz' * hostlist check for profile 1 [C:\Users\ads\Desktop\YTDisBystroold\lists\netrogat.txt] include hostlist check for rp.ru.ee.matchnet.xyz : negative hostlist check for ru.ee.matchnet.xyz : negative hostlist check for ee.matchnet.xyz : negative hostlist check for matchnet.xyz : negative hostlist check for xyz : negative * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 109.206.241.91 : negative * hostlist check for profile 4 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube.txt] include hostlist check for rp.ru.ee.matchnet.xyz : negative hostlist check for ru.ee.matchnet.xyz : negative hostlist check for ee.matchnet.xyz : negative hostlist check for matchnet.xyz : negative hostlist check for xyz : negative * hostlist check for profile 6 [C:\Users\ads\Desktop\YTDisBystroold\lists\myhostlist.txt] include hostlist check for rp.ru.ee.matchnet.xyz : negative hostlist check for ru.ee.matchnet.xyz : negative hostlist check for ee.matchnet.xyz : negative hostlist check for matchnet.xyz : negative hostlist check for xyz : negative [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-blacklist.txt] include hostlist check for rp.ru.ee.matchnet.xyz : negative hostlist check for ru.ee.matchnet.xyz : negative hostlist check for ee.matchnet.xyz : negative hostlist check for matchnet.xyz : negative hostlist check for xyz : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 109.206.241.91 : negative desync profile 10 matches dpi desync src=192.168.1.6:51407 dst=109.206.241.91:443 regular split pos: 147 normalized regular split pos : 147 seqovl : 1 sending fake(1) 1st tcp segment 0-146 len=147 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending 1st tcp segment 0-146 len=147 seqovl=1 : 00 16 03 01 06 BE 01 00 06 BA 03 03 D2 D0 11 17 53 75 13 58 35 65 FF 65 E4 93 12 F3 7C 9C 6F 7E ... : ................Su.X5e.e....|.o~ ... sending fake(2) 1st tcp segment 0-146 len=147 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending fake(1) 2nd tcp segment 147-1459 len=1313 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending 2nd tcp segment 147-1459 len=1313 : 63 68 6E 65 74 2E 78 79 7A FE 0D 00 BA 00 00 01 00 01 82 00 20 65 EE B4 C0 06 19 3F 4B 63 2D EC ... : chnet.xyz........... e.....?Kc-. ... sending fake(2) 2nd tcp segment 147-1459 len=1313 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... DROPPING delayed packet #1 REPLAYING delayed packet #2 offset 1460 REPLAY IP4: 192.168.1.6 => 109.206.241.91 proto=tcp ttl=64 sport=51407 dport=443 flags=AP seq=3525858121 ack_seq=3679923527 TCP: len=271 : C8 43 6E F4 3A 01 24 AC 7E 8A 6F 68 7B 57 07 1C 64 C7 B0 0F 1C AB 12 D1 5C 98 F8 25 70 A3 F6 30 ... : .Cn.:.$.~.oh{W..d.......\..%p..0 ... using cached desync profile 10 packet contains full TLS ClientHello hostname: rp.ru.ee.matchnet.xyz dpi desync src=192.168.1.6:51407 dst=109.206.241.91:443 regular split pos: 147 regular split pos is outside of this packet seqovl : 1 SENDING delayed packet #2 unmodified reassemble session finished packet: id=362 drop packet: id=363 len=1500 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 109.206.241.91 proto=tcp ttl=64 sport=51407 dport=443 flags=AP seq=3525856932 ack_seq=3679923527 TCP: len=1460 : 0A 27 ED D3 76 AB 59 A2 86 F1 3E C3 CD 64 9C 70 62 13 09 CB E6 90 A9 0A 06 D0 69 EE 0E DD 06 50 ... : .'..v.Y...>..d.pb.........i....P ... using cached desync profile 10 wssize-cutoff reached (mode n): 4/0 . not changing wssize. not applying tampering to unknown protocol packet: id=363 reinject unmodified packet: id=364 len=104 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 109.206.241.91 proto=tcp ttl=64 sport=51407 dport=443 flags=AP seq=3525858392 ack_seq=3679925915 TCP: len=64 : 14 03 03 00 01 01 17 03 03 00 35 43 24 62 67 3D 85 71 E6 C4 09 56 B5 24 98 18 61 23 F3 AE 9A 31 ... : ..........5C$bg=.q...V.$..a#...1 ... using cached desync profile 10 wssize-cutoff reached (mode n): 5/0 . not changing wssize. not applying tampering to unknown protocol packet: id=364 reinject unmodified packet: id=365 len=402 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 109.206.241.91 proto=tcp ttl=64 sport=51407 dport=443 flags=AP seq=3525858456 ack_seq=3679925915 TCP: len=362 : 17 03 03 01 65 CE F8 45 20 43 04 66 EF 6D 00 43 11 93 CA 35 ED 1A 5A 24 A2 15 A1 7E 2B 54 F7 F1 ... : ....e..E C.f.m.C...5..Z$...~+T.. ... using cached desync profile 10 wssize-cutoff reached (mode n): 6/0 . not changing wssize. not applying tampering to unknown protocol packet: id=365 reinject unmodified packet: id=366 len=475 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 109.206.241.91 proto=tcp ttl=64 sport=51407 dport=443 flags=AP seq=3525858818 ack_seq=3679926776 TCP: len=435 : 17 03 03 01 AE 18 94 15 78 82 34 3F E6 FB 63 A8 93 E6 4E F7 86 12 4B AE 91 77 48 38 18 C9 D1 DF ... : ........x.4?..c...N...K..wH8.... ... using cached desync profile 10 wssize-cutoff reached (mode n): 7/0 . not changing wssize. not applying tampering to unknown protocol packet: id=366 reinject unmodified packet: id=367 len=52 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 45.112.195.82 proto=tcp ttl=64 sport=51408 dport=443 flags=S seq=196553195 ack_seq=0 desync profile search for tcp target=45.112.195.82:443 l7proto=unknown hostname='' * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 45.112.195.82 : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 45.112.195.82 : negative desync profile 10 matches Window size change 64240 => 1 Scale factor change 8 => 6 packet: id=367 reinject modified len=52 packet: id=368 len=52 inbound IPv6=0 IPChecksum=0 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 45.112.195.82 => 192.168.1.6 proto=tcp ttl=48 sport=443 dport=51408 flags=SA seq=894155641 ack_seq=196553196 using cached desync profile 10 incoming TTL 48 packet: id=368 reinject unmodified packet: id=369 len=1500 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 45.112.195.82 proto=tcp ttl=64 sport=51408 dport=443 flags=A seq=196553196 ack_seq=894155642 TCP: len=1460 : 16 03 01 06 DF 01 00 06 DB 03 03 93 54 FF 0D 52 F8 C3 24 BB CA BE E5 81 4D 90 F7 67 E0 19 64 F3 ... : ............T..R..$.....M..g..d. ... using cached desync profile 10 Window size change 1026 => 1 packet contains partial TLS ClientHello starting reassemble. now we have 1460/1764 req retrans : seq interval 196553196-196554655 DELAY desync until reasm is complete (#1) packet: id=369 drop packet: id=370 len=344 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 45.112.195.82 proto=tcp ttl=64 sport=51408 dport=443 flags=AP seq=196554656 ack_seq=894155642 TCP: len=304 : 7F 52 33 C4 09 2A 89 A6 51 CB 4A 63 34 8B 7D A3 28 BD AD D8 A5 7E CB 07 0C 30 29 3F D5 7A 98 42 ... : R3..*..Q.Jc4.}.(....~...0)?.z.B ... using cached desync profile 10 Window size change 1026 => 1 reassemble : feeding data payload size=304. now we have 1764/1764 packet contains full TLS ClientHello req retrans : seq interval 196553196-196554959 forced wssize-cutoff DELAY desync until reasm is complete (#2) REPLAYING delayed packet #1 offset 0 REPLAY IP4: 192.168.1.6 => 45.112.195.82 proto=tcp ttl=64 sport=51408 dport=443 flags=A seq=196553196 ack_seq=894155642 TCP: len=1460 : 16 03 01 06 DF 01 00 06 DB 03 03 93 54 FF 0D 52 F8 C3 24 BB CA BE E5 81 4D 90 F7 67 E0 19 64 F3 ... : ............T..R..$.....M..g..d. ... using cached desync profile 10 packet contains full TLS ClientHello hostname: rp.ru.yt6.matchnet.xyz discovered l7 protocol discovered hostname desync profile search for tcp target=45.112.195.82:443 l7proto=tls hostname='rp.ru.yt6.matchnet.xyz' * hostlist check for profile 1 [C:\Users\ads\Desktop\YTDisBystroold\lists\netrogat.txt] include hostlist check for rp.ru.yt6.matchnet.xyz : negative hostlist check for ru.yt6.matchnet.xyz : negative hostlist check for yt6.matchnet.xyz : negative hostlist check for matchnet.xyz : negative hostlist check for xyz : negative * ipset check for profile 2 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube-rtmps.txt] include ipset check for 45.112.195.82 : negative * hostlist check for profile 4 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-youtube.txt] include hostlist check for rp.ru.yt6.matchnet.xyz : negative hostlist check for ru.yt6.matchnet.xyz : negative hostlist check for yt6.matchnet.xyz : negative hostlist check for matchnet.xyz : negative hostlist check for xyz : negative * hostlist check for profile 6 [C:\Users\ads\Desktop\YTDisBystroold\lists\myhostlist.txt] include hostlist check for rp.ru.yt6.matchnet.xyz : negative hostlist check for ru.yt6.matchnet.xyz : negative hostlist check for yt6.matchnet.xyz : negative hostlist check for matchnet.xyz : negative hostlist check for xyz : negative [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-blacklist.txt] include hostlist check for rp.ru.yt6.matchnet.xyz : negative hostlist check for ru.yt6.matchnet.xyz : negative hostlist check for yt6.matchnet.xyz : negative hostlist check for matchnet.xyz : negative hostlist check for xyz : negative * ipset check for profile 7 [C:\Users\ads\Desktop\YTDisBystroold\lists\russia-discord-ipset.txt] include ipset check for 45.112.195.82 : negative desync profile 10 matches dpi desync src=192.168.1.6:51408 dst=45.112.195.82:443 regular split pos: 414 normalized regular split pos : 414 seqovl : 1 sending fake(1) 1st tcp segment 0-413 len=414 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending 1st tcp segment 0-413 len=414 seqovl=1 : 00 16 03 01 06 DF 01 00 06 DB 03 03 93 54 FF 0D 52 F8 C3 24 BB CA BE E5 81 4D 90 F7 67 E0 19 64 ... : .............T..R..$.....M..g..d ... sending fake(2) 1st tcp segment 0-413 len=414 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending fake(1) 2nd tcp segment 414-1459 len=1046 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... sending 2nd tcp segment 414-1459 len=1046 : 63 68 6E 65 74 2E 78 79 7A 00 1B 00 03 02 00 02 00 0D 00 12 00 10 04 03 08 04 04 01 05 03 08 05 ... : chnet.xyz....................... ... sending fake(2) 2nd tcp segment 414-1459 len=1046 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... : ................................ ... DROPPING delayed packet #1 REPLAYING delayed packet #2 offset 1460 REPLAY IP4: 192.168.1.6 => 45.112.195.82 proto=tcp ttl=64 sport=51408 dport=443 flags=AP seq=196554656 ack_seq=894155642 TCP: len=304 : 7F 52 33 C4 09 2A 89 A6 51 CB 4A 63 34 8B 7D A3 28 BD AD D8 A5 7E CB 07 0C 30 29 3F D5 7A 98 42 ... : R3..*..Q.Jc4.}.(....~...0)?.z.B ... using cached desync profile 10 packet contains full TLS ClientHello hostname: rp.ru.yt6.matchnet.xyz dpi desync src=192.168.1.6:51408 dst=45.112.195.82:443 regular split pos: 414 regular split pos is outside of this packet seqovl : 1 SENDING delayed packet #2 unmodified reassemble session finished packet: id=370 drop packet: id=371 len=104 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 45.112.195.82 proto=tcp ttl=64 sport=51408 dport=443 flags=AP seq=196554960 ack_seq=894158030 TCP: len=64 : 14 03 03 00 01 01 17 03 03 00 35 BA 05 CA 05 6B C1 F3 F5 70 CD 19 00 D7 12 9F 4D 4B B3 14 2C 42 ... : ..........5....k...p......MK..,B ... using cached desync profile 10 wssize-cutoff reached (mode n): 4/0 . not changing wssize. not applying tampering to unknown protocol packet: id=371 reinject unmodified packet: id=372 len=357 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 45.112.195.82 proto=tcp ttl=64 sport=51408 dport=443 flags=AP seq=196555024 ack_seq=894158030 TCP: len=317 : 17 03 03 01 38 C7 14 E5 5C 3D C7 07 91 1F CC FF 88 D4 50 E4 FA D1 66 37 75 E5 AC EC B8 CD E7 C5 ... : ....8...\=........P...f7u....... ... using cached desync profile 10 wssize-cutoff reached (mode n): 5/0 . not changing wssize. not applying tampering to unknown protocol packet: id=372 reinject unmodified packet: id=373 len=1500 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 45.112.195.82 proto=tcp ttl=64 sport=51408 dport=443 flags=A seq=196555341 ack_seq=894158569 TCP: len=1460 : 17 03 03 08 D5 72 9B 83 85 85 4B E2 DD E8 22 C9 B3 56 17 25 A0 EB 6C 50 A6 C6 8C 96 99 13 BD F7 ... : .....r....K..."..V.%..lP........ ... using cached desync profile 10 wssize-cutoff reached (mode n): 6/0 . not changing wssize. not applying tampering to unknown protocol packet: id=373 reinject unmodified packet: id=374 len=846 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 45.112.195.82 proto=tcp ttl=64 sport=51408 dport=443 flags=AP seq=196556801 ack_seq=894158569 TCP: len=806 : C5 F4 E6 B2 5A 5C 56 A5 4E DA 3F 45 05 E5 EF 78 E0 10 BC 88 26 C3 E1 D9 99 50 E8 6C 22 F5 5D 4F ... : ....Z\V.N.?E...x....&....P.l".]O ... using cached desync profile 10 wssize-cutoff reached (mode n): 7/0 . not changing wssize. not applying tampering to unknown protocol packet: id=374 reinject unmodified packet: id=375 len=136 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 45.112.195.82 proto=tcp ttl=64 sport=51408 dport=443 flags=AP seq=196557607 ack_seq=894166471 TCP: len=96 : 17 03 03 00 5B DE F7 9E 92 B6 7A 73 27 FB 47 97 62 7C D7 4A EA 7C EE 2B AD A2 3D 1C 32 FD 7F 82 ... : ....[.....zs'.G.b|.J.|.+..=.2.. ... using cached desync profile 10 wssize-cutoff reached (mode n): 8/0 . not changing wssize. not applying tampering to unknown protocol packet: id=375 reinject unmodified packet: id=376 len=154 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 45.112.195.82 proto=tcp ttl=64 sport=51408 dport=443 flags=AP seq=196557703 ack_seq=894166471 TCP: len=114 : 17 03 03 00 6D 25 CE EE FD DC 7A EC BE D0 9C DB 9D 5B 1B 01 DF 8C CD 0A CB 3A AB BD 8E 21 DE 98 ... : ....m%....z......[.......:...!.. ... using cached desync profile 10 wssize-cutoff reached (mode n): 9/0 . not changing wssize. not applying tampering to unknown protocol packet: id=376 reinject unmodified packet: id=377 len=1500 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 45.112.195.82 proto=tcp ttl=64 sport=51408 dport=443 flags=A seq=196557817 ack_seq=894166471 TCP: len=1460 : 17 03 03 09 A1 51 D8 5F B0 D0 5C 1D B5 72 39 35 0B 0F 27 7D E6 92 3C 85 E1 0D F8 D4 06 83 B0 0E ... : .....Q._..\..r95..'}..<......... ... using cached desync profile 10 wssize-cutoff reached (mode n): 10/0 . not changing wssize. not applying tampering to unknown protocol packet: id=377 reinject unmodified packet: id=378 len=1050 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 45.112.195.82 proto=tcp ttl=64 sport=51408 dport=443 flags=AP seq=196559277 ack_seq=894166471 TCP: len=1010 : BB 06 44 A9 33 A8 C2 AB 1E D9 67 1B A0 E2 7D C4 6C 87 2D 3B BE 62 51 C2 A2 C5 89 55 D8 67 B1 F1 ... : ..D.3.....g...}.l.-;.bQ....U.g.. ... using cached desync profile 10 wssize-cutoff reached (mode n): 11/0 . not changing wssize. not applying tampering to unknown protocol packet: id=378 reinject unmodified packet: id=379 len=93 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 45.112.195.82 proto=tcp ttl=64 sport=51408 dport=443 flags=AP seq=196560287 ack_seq=894167453 TCP: len=53 : 17 03 03 00 30 67 A6 06 CD 1B BC 7A C7 0E 1C 11 17 E8 BB 67 D7 B3 7C D7 A3 60 12 B4 26 E7 13 38 ... : ....0g.....z.......g..|..`..&..8 ... using cached desync profile 10 wssize-cutoff reached (mode n): 12/0 . not changing wssize. not applying tampering to unknown protocol packet: id=379 reinject unmodified packet: id=380 len=97 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 45.112.195.82 proto=tcp ttl=64 sport=51408 dport=443 flags=AP seq=196560340 ack_seq=894172848 TCP: len=57 : 17 03 03 00 34 06 AE C1 94 47 CA EC AA 1C E1 35 81 DD BF 24 51 6F A0 18 9C D6 AD 59 A6 C9 0B F6 ... : ....4....G.....5...$Qo.....Y.... ... using cached desync profile 10 wssize-cutoff reached (mode n): 13/0 . not changing wssize. not applying tampering to unknown protocol packet: id=380 reinject unmodified packet: id=381 len=41 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 34.107.221.82 proto=tcp ttl=64 sport=51368 dport=80 flags=A seq=3571870220 ack_seq=3055136677 TCP: len=1 : 00 : . desync profile search for tcp target=34.107.221.82:80 l7proto=unknown hostname='' desync profile 0 matches not applying tampering to unknown protocol packet: id=381 reinject unmodified packet: id=382 len=41 outbound IPv6=0 IPChecksum=1 TCPChecksum=0 UDPChecksum=1 IfIdx=10.0 IP4: 192.168.1.6 => 34.107.221.82 proto=tcp ttl=64 sport=51361 dport=80 flags=A seq=1602401641 ack_seq=2961765197 TCP: len=1 : 00 : . desync profile search for tcp target=34.107.221.82:80 l7proto=unknown hostname='' desync profile 0 matches not applying tampering to unknown protocol packet: id=382 reinject unmodified