Proxy servers and iP**er outside of UK etc - Vega General

Every now and again I run out of things to watch on my laptop when abroad, so I turn on the hotel TV and find myself watching the same BBC World news or CNN news reports over and over.
When that happens, I normally try and set up FoxyProxy so I can watch iP***er etc. I usually spend about an hour trying to get the damn thing working before giving up and heading to the minibar!
I have never, ever found a working UK internet enabled proxy in probably 4 years. I don't know if I am just not using Foxyproxy correctly, or if proxies are that hard to find.
Anyway, long story short... has anyone used a proxy server on the Vega. Is so, which software did you use and more importantly which proxy and how did you set it up?!

It is possible, but unfortunately that is illegal. You are not allowed to watch bbc iplayer outside of the uk. I think this might break the site rules, and a mod might close the thread. Giving you info on how to circumvent might get me into trouble too. Sorry i cant help, but rules are rules

Circumventing a corporations draconian T&C's have never seemed to be too much of an issue for XDA. If it was, I'm not entirely sure it would be in existence
Nonetheless, edited...!
PS - The irony of being warned about legality by a member with your username is not lost on me

Ah, ganjaman just uses hemp to make phone/tablet covers.
what else could one do with that plant?
back on topic, there must be ways of obtaining foreign proxies, which in itself isnt naughty. As you could use this for many reasons.
Or is it that ipla yer recognises that fact and blocks ones attempt?
If the request is about the player then, fine, not allowed, but surely the proxy question is valid?
Playing devils advocate.
Rgds
Lok

The problem I encounter is actually connecting to a valid proxy, before even typing in a URL. As I said, I don't know if its an issue with FoxyProxy or the list of proxies that I work my way through on Google.
I was hoping to hear that somebody had successfully connected to a proxy server using Android. I can then test it myself, then go off and find a valid UK proxy with the knowledge that at least the program works as it should!

Not sure if you have seen this http://forum.xda-developers.com/showthread.php?t=766569. Just have to find a good proxy list. Works on are vegas
Asking the question in a different way is all you had to do. Sorry if you took it the wrong way, i just dont want xda dev to have illegal content, and worst being kicked out for suppling it.
As orlok said, i am in the uk, its cases for my tablet only
Unfortunately some countries have draconian laws, like here.

Related

How does google know that I surfed in from a pda

Hello
The other day i surfed to google from my XDA exec.
mobile internet rocks!!
i was wondering how does google know that i surfed in from a pda, cause i think it sent me to
www.google.co.uk/pda
the web page probably detected your screen size and redirected you to a page that was more friendly to you PDA browser. i wish more sites would do this.
www.google.com/pda for us US residents.
LOL
Not the screen size but the type of your internet browser, in this case Pocket IE.
Correct--it's not the screen size.
Although a LOT of your information is sent over the wire, much more than most of us realize, your resolution information is unknown to most websites, unless you explicitly allow it to be given via some kind of an executable that transmits such information. An example would be an embedded ActiveX object in IE for Windows.
Back on topic, yes, your browser information is known, not only to Google, but to every other website you visit. Not only that, the website also knows where you came from (i.e. the http addy) and where you went when you left it. There's a whole bunch of information deemed to be private that we would rather keep to ourselves (such as our surfing habits) that's known to any website that installs a cookie (a common thing nowadays) on your computer.
This is also how Google knows where you are. For example, when I log on, Google send me to the local Saudi page at http://www.google.com.sa/ It knows this information by doing a reverse lookup on your IP address, and comparing it against known databases of geographically assigned IPs. Since IP addresses are assigned and tied to geographical locations, it's easy enough to do, although it's still very disconcerting to see.
Be careful folks, even your searching habits are being tracked by Google. I have nothing to hide, so I don't care, but many folks do. Witness the recent Federal inquiry into the searching habits of the users of major search engines. Yahoo and MSN gave up that information quickly enough but Google is resisting. I don't think it will be able to hold out for very long though.
Imagine...now the fact that you searched for p0rn on the 'net is well known to anyone in the know. Scary, isn't it?
This Privacy Newsbyte brought to you courtesy of XDA-Dev's online donation campaign. Donate or be left in the dust!
thanks monakh
so google can detect both my mobile ip address (is there such a thing?) and my browser, correct?
monakh said:
the website also knows where you came from (i.e. the http addy)
Click to expand...
Click to collapse
Correct, through the referrer...
monakh said:
and where you went when you left it.
Click to expand...
Click to collapse
Only if you click a link on the site itself, -and- it is handled via a special handler.
No information is sent to a website when you leave it through e.g. a bookmark in your browser, or by typing in a new URL.
Please correct me if I'm wrong
You are correct.
hey i mailed myself (google account) using my adsl modem and using the gprs/3g connection to check the header to see if i could spot an originating ip address
i found one common ip address
Received: by 10.xy.za.b with HTTP; Sat, 18 Feb 2006 05:34:45 -0800 (PST)
i guess this is the google server, correct?
is there any way to prise the originating ip address from an email
That's why there is a registry hack to set Pocket Internet Explorer works like Internet Explorer 6.0.
Tuningszocske said:
That's why there is a registry hack to set Pocket Internet Explorer works like Internet Explorer 6.0.
Click to expand...
Click to collapse
Not entirely... I mean, you could - of course. But it also means that many sites will fail to send you PDA-specific content - which, with most plans/top-ups, means heavy costs.
Identifying PIE as IE6 is more used for stupid websites who check whether the browser is IE6 or above, regardless of whether that is actually required by the site.
There's three parts, the compatibility bit ('(Default) = Mozilla/4.0'), the browser string ('Version = MSIE 6.0') and the platform ('Platform = Windows NT 5.0'). If you leave the last bit intact ('Platform = Windows CE'), then you should still be able to get into stupid sites, while having PDA-friendly sites send you the PDA content.
oh i had not thought about the popups
i guess we wont get(suffer) popups with mobile ie5?
i just posted to this bulletin board to check my ip address
from the pc it looks like this 82.1a.bcd.efg
and fro my cda it looks like 193.abc.def.ghi
That's fine because presumably your mobile device and your home PC are on different networks so they sport different IPs.
IPs are a dead giveaway. In many cases, your position can be 'somewhat' and primitively triangulated to within 5 square miles of where you are. This may not be necessarily true for mobile networks, but those networks know where you are at all times anyway. In fact, there is now regulation in the US that mandates all handset makers to manufacture hardware with GPS functionality built-in. Between the two and a half dozen GPS satellites and your cellular network, you can run but you can't hide
This is, of course, so emergency services can reach you in time of need (in case you are unable to make the call to 911/999).
Of course...
monakh said:
This is, of course, so emergency services can reach you in time of need (in case you are unable to make the call to 911/999).
Click to expand...
Click to collapse
off-topic...
Technically it's so they can find you if you do call 911/999/112/whathaveyou but are unable (due to injuries, or duress, etc.) to state your location.
Being able to find you at any time is an added perk but it needs court orders even if you have been reported and officially designated a "missing person". Getting such a court order can take many hours, being declared a missing person can take 24 hours up to 48 hours (depends on the country and exactly what reasons you have to believe the person in question is truely missing).
ZeBoxx said:
monakh said:
This is, of course, so emergency services can reach you in time of need (in case you are unable to make the call to 911/999).
Click to expand...
Click to collapse
off-topic...
Technically it's so they can find you if you do call 911/999/112/whathaveyou but are unable (due to injuries, or duress, etc.) to state your location.
Click to expand...
Click to collapse
Ahh yes, I stand corrected.
It's so we CAN make the call and are unable to state the location. That WOULD make sense. However, like you said, there are legal hurdles, although at least in the U.S., they are fewer and far between.
is there any ip address list out there which tells me which ip addresses are allocated to which country?
are ip addresses bunched like telephone numbers
e.g. +1 is north america
+3 and +4 is europe
+96 & +97 middle east
nope, that's not how they work
organisations can get an IP from their service provider, who get blocks from their service providers, who get bigger blocks from places like RIPE, who in turn get huge blocks from ARIN.
But if it's a specific IP you're interested in, try VisualRoute

Skyfire and my credentials

Well,
I just heard that SkyFire use a server to render the internet pages I go to,
and, well, since I did go to several places that require me to put in
my username and password - Im now wondering:
Did the information go to the SkyFire server unencrypted ?
Did the SkyFire serber was the one to pass them on to the site ?
How can I know if the info was stored somewhere on their servers ?
opera works like that too, and I've never heard anyone mention security issues and that's a very popular browser.if this was an issue I'm sure it would have been discussed at length all over the web.
samsamuel said:
opera works like that too, and I've never heard anyone mention security issues and that's a very popular browser.if this was an issue I'm sure it would have been discussed at length all over the web.
Click to expand...
Click to collapse
Hmmm . . . Im not 100% sure Opera works like that too (at least some pocketnow.com comparison suggests Opera renders the pages on the device itself).
And - maybe most people are not as paranoid as me ,
so maybe they never thought about the subject, and about the potential security risk.
Assuming one uses the device to access his bank/investment account, and other personal info, "givig away" your username and password to some server, that you have no control over, and have no idea of the use the server operators do with this data is not so safe . . .
hmm not sure of the technicalities of it but certainly opera routes all its traffic through their own servers. I guess the answer then is lots of research from multiple sources.
Opera mini does reroute your data through its severs but not opera mobile unless you have opera turbo switched on. thats my understanding of it.
ahh ok that makes sense.

How will "they" know if I tether with a rooted Nexus One

Just read Tmobile is going to charge for tethering & wi-fi hot spot. How will they know? Isn't data, data? I don't want to be charged for something I might use 5 times a year.
Sent from my Nexus One CM6 using XDA App
I don't know if they can tell, I have used the hotspot feature with my Nexus quite often and AT&T has never tried to charge me.
They wont.
[email protected] said:
Just read Tmobile is going to charge for tethering & wi-fi hot spot. How will they know? Isn't data, data? I don't want to be charged for something I might use 5 times a year.
Sent from my Nexus One CM6 using XDA App
Click to expand...
Click to collapse
Where did you read this from? No source, it didnt happen.
Starts 11/3/2010
Zephyron said:
Where did you read this from? No source, it didnt happen.
Click to expand...
Click to collapse
http://www.boygeniusreport.com/2010/10/26/t-mobile-to-debut-tethering-plan-on-november-3rd-14-99/
the only way they could know if you are tethering is if you are using the carrier's native ROM, i don't think they would ever find out when running a custom rom.
If you don't bother searching - at least do read the same thread on the same 1st page of the forum, instead of opening another one.
Einstein was right about infinite things...
Packages being sent contain HTTP requests, which may contain info on the device that's being used, among other stuff I don't really know about.
If those packages contain specific info on the device, they probably can tell even if you're using a custom ROM, just by putting some effort into it.
Anyways, if by some mean they'd manage to analyze it in a way where they can tell whether you're tethering or not, we'll also find a way to trick them by parsing those packages on the fly.
So, ultimately, I don't know whether they can tell or not if you're tethering, but if they can don't worry, someone will take care of it.
St.Jimmy! said:
Packages being sent contain HTTP requests, which may contain info on the device that's being used, among other stuff I don't really know about.
If those packages contain specific info on the device, they probably can tell even if you're using a custom ROM, just by putting some effort into it.
Anyways, if by some mean they'd manage to analyze it in a way where they can tell whether you're tethering or not, we'll also find a way to trick them by parsing those packages on the fly.
So, ultimately, I don't know whether they can tell or not if you're tethering, but if they can don't worry, someone will take care of it.
Click to expand...
Click to collapse
Companies cannot legally spy into your network traffic in that manner here in the US.
JCopernicus said:
Companies cannot legally spy into your network traffic in that manner here in the US.
Click to expand...
Click to collapse
This is true, deep packet inspection is against the law as it infringes what little privacy we are still allowed thanks to homeland security
St.Jimmy! said:
Packages being sent contain HTTP requests, which may contain info on the device that's being used, among other stuff I don't really know about.
Click to expand...
Click to collapse
Not picking on you, but I'm sure you mean packets
Here in France, SFR set up atransparemt proxy that checks the user-agent sent by your browser.
You can trick it by setting a mobile user-agent on your PC.
Sent from my nexus desire
zEar said:
Here in France, SFR set up atransparemt proxy that checks the user-agent sent by your browser.
You can trick it by setting a mobile user-agent on your PC.
Sent from my nexus desire
Click to expand...
Click to collapse
That's screwed. You can set any UA when using a custom ROM, so you'd be charged for tethering when you set it to Desktop?
In that case, someone might have a good reason to sue them...
Thanks for the info.
Sent from my Nexus One CM6 using XDA App
Jack_R1 said:
That's screwed. You can set any UA when using a custom ROM, so you'd be charged for tethering when you set it to Desktop?
In that case, someone might have a good reason to sue them...
Click to expand...
Click to collapse
First, you're right. But I forgot to mention that they won't charge you, it simply doesn't work. So if you changed the UA the way you suggest, you would see a blank page and quickly fix that
Second, I noticed after answering that I didn't read the question well (sh*t happens ) and didn't get the point about root. So to be more clear about the original question :
- "They" shouldn't be able to know if you're rooted or not, but there may be ways for them to detect that you are tethering.
Tethering and T-mobile...
If you run speedtest.net on a computer that's tethered to the N1, it shows on speedtest.net's server that you are on T-mobile USA's IP. Somehow T-mobile would have to acquire when the tether option was turned on and off at the same time the 3g service is on. They would have to submit that into the header files that get sent to their services. That would be a stretch, but it would be doable in future software updates. Say Gingerbread....
Actually, yesterday I've found something interesting about one of our local carriers.
It has 2 APNs: one for "dumbphones" and one for smartphones.
The first one allows Nexus to use internet and market, but tethering doesn't work. The DNS requests are blocked - I still didn't figure out how they block them. DNS servers get the ping, but the requests aren't resolved. Yet it looks like they're resolved, if sent from the phone.
The second one allows full internet access for the phone - and tethering also works.
So they don't detect tethering (and don't charge for it), but looks like they can block it with some restrictions that still allow the phone browser to work, when using "dumbphone" APN.
Jack_R1 said:
Actually, yesterday I've found something interesting about one of our local carriers.
It has 2 APNs: one for "dumbphones" and one for smartphones.
The first one allows Nexus to use internet and market, but tethering doesn't work. The DNS requests are blocked - I still didn't figure out how they block them. DNS servers get the ping, but the requests aren't resolved. Yet it looks like they're resolved, if sent from the phone.
The second one allows full internet access for the phone - and tethering also works.
So they don't detect tethering (and don't charge for it), but looks like they can block it with some restrictions that still allow the phone browser to work, when using "dumbphone" APN.
Click to expand...
Click to collapse
so all the other data, non browser based - how do they decide if/when to block which data ? i'm assuming this will only work on a non-rooted phone, or they are breaking the law and doing deep inspection.
if they =are= doing deep packet inspection, they can and will be held liable for eavesdropping, child porn, online harrassement (if you ever harrass someone), and a whole host of other things.
the ISP (tmo) not knowing what you're doing is a benefit to them. ignorance is bliss, and knowledge means responsibility the way the gov't views it.
lol, that last statement, the gov't and responsibility could be a joke i guess.
I believe they just have all traffic going through proxy which allows only very few selected packet types through, and blocks the rest for "dumbphone" APN. They don't check/block anything beyond DNS requests, and if you want to connect to a site while tethering "dumbphone" connection by IP - I believe you'll get there (didn't have a chance to test, but pinging IPs works without problems).
And of course, my Nexus with Enomther's ROM was used for experiments and showed exactly the same behavior.
The thing is - if I understand it correctly, it's not a planned behavior. They wanted to shut off all the network but the sites they give access to from their own WAP portal (considered "internal" internet), but in fact for some reason Nexus isn't completely blocked by it. PC is, though, when connected through Nexus.
And again, they don't have something that detects tethering - once a smartphone APN is used, the traffic is the same for Nexus and for tethered devices.
Some technical info...
Hello!
There is a way to detect if You are using tethering. Basically - tethering is routing - adding one more point in communications. So - if You just use Your phone, packets are addressed from/to Your phone. But if You are tethering - packets are addressed to device behind phone (using phone as gateway, basically router with NAT).
So - they may check:
ARP tables
TTLs
OS specific packets/DNS requests/used IP's (Why would Your phone check for MS updates? )
other things...

bypass school router blocks

hey, i used to have a way around the school router blocks but i cant seem to remember what it was for the life of me. What it consisted was of an .exe that installed some software that allowed me to browse freely. I vaguely remember that the software consisted of a icon on the taskbar that was kinda an earth with fire around it....maybe?
if you have any other good router/server bypasses then please let me know. .exe file executions are blocked everywhere except in the technology building at school. Preferably i would like to have something only requiring a flash drive or it can be done within IE or Chrome.
Do u mean that you are able to surf the internet but some website, like Facebook for example , are blocked?
yukinok25 said:
Do u mean that you are able to surf the internet but some website, like Facebook for example , are blocked?
Click to expand...
Click to collapse
yes exactly, often they have keywords that they block as well, (such as game, kill, black ops, etc). maybe a proxy would work? we used to have a couple good ones but they would eventually block it.
johnston9234 said:
yes exactly, often they have keywords that they block as well, (such as game, kill, black ops, etc). maybe a proxy would work? we used to have a couple good ones but they would eventually block it.
Click to expand...
Click to collapse
yes, a free proxy can be a solution in most cases, here try some in this list first:
http://www.publicproxyservers.com/proxy/list1.html
johnston9234 said:
hey, i used to have a way around the school router blocks but i cant seem to remember what it was for the life of me. What it consisted was of an .exe that installed some software that allowed me to browse freely. I vaguely remember that the software consisted of a icon on the taskbar that was kinda an earth with fire around it....maybe?
if you have any other good router/server bypasses then please let me know. .exe file executions are blocked everywhere except in the technology building at school. Preferably i would like to have something only requiring a flash drive or it can be done within IE or Chrome.
Click to expand...
Click to collapse
To do this would require some form of exe to use a proxy via a specially setup browser, or admin rights to set the system proxy.
You will find that your IT admins will block the proxies you use (I have to block proxies at my work network when we detect them).
If implemented properly (any good professional IT admin should be able to do it right), you will struggle to tunnel out using most systems.
You can't ssh forward if they block non-standard ports, or filter protocols. You can't use SOCKS proxies if they do the same. You can't use web proxies if they use smart URL filtering.
You can try web proxies, but it's an uphill battle. If you find a proxy that works, don't tell your friends, as that usage across multiple accounts flags the URL in some security systems (my users alert me to the latest proxy sites unwittingly )
Finally, you do realise you are probably breaking the acceptable use agreement? Isn't it better to do facebook etc out of school hours? Or use your phone? If you get good at evading, it is easy to remove internet access altogether from an account in most systems. Good luck in tunnelling out when you have zero internet access as your account is null routed
Summary? Try proxies, don't hold your breath, and do you really need to use facebook etc in school? Oh, and for goodness sake, don't run exes on school PCs... If they've not set them up right, you could infect the machines. They prevent EXE execution on most machines for good reason...
pulser_g2 said:
To do this would require some form of exe to use a proxy via a specially setup browser, or admin rights to set the system proxy.
You will find that your IT admins will block the proxies you use (I have to block proxies at my work network when we detect them).
If implemented properly (any good professional IT admin should be able to do it right), you will struggle to tunnel out using most systems.
You can't ssh forward if they block non-standard ports, or filter protocols. You can't use SOCKS proxies if they do the same. You can't use web proxies if they use smart URL filtering.
You can try web proxies, but it's an uphill battle. If you find a proxy that works, don't tell your friends, as that usage across multiple accounts flags the URL in some security systems (my users alert me to the latest proxy sites unwittingly )
Finally, you do realise you are probably breaking the acceptable use agreement? Isn't it better to do facebook etc out of school hours? Or use your phone? If you get good at evading, it is easy to remove internet access altogether from an account in most systems. Good luck in tunnelling out when you have zero internet access as your account is null routed
Summary? Try proxies, don't hold your breath, and do you really need to use facebook etc in school? Oh, and for goodness sake, don't run exes on school PCs... If they've not set them up right, you could infect the machines. They prevent EXE execution on most machines for good reason...
Click to expand...
Click to collapse
This is a REALLY good explanation Pulser, I always liked the way you answer to the people on XDA! (specially on the Hero thread )
By the way, why an .exe file would infect a machine? Do you mean any kind of .exe? Even from a well known company, who create safe and populars software?
I used to run, without tell anyone, firefox portable in my office to bypass firewall restrictions, is that dangerous as well?
Considering you are at school, you will lack a lot of needed rights to edit certain things. I would know, I had to get around blocks on both Windows and Mac computers my freshman year.
I would advise you use the software, Your Freedom, it's free, but requires an account, you will also need to use a browser such as Firefox, and edit the settings to use the correct IP and Port as a proxy.
It also works on both Mac's and PC's. There is another software that I had used, strictly for windows PC's, but I can't recall the name of it.
Edit: I also ran the software from my flash drive..
i have special access to .exe and Command prompt just because of the position i am in as a student (several Technical courses). I can execute files on my computer and i have Chrome Installed. Does that help?
johnston9234 said:
i have special access to .exe and Command prompt just because of the position i am in as a student (several Technical courses). I can execute files on my computer and i have Chrome Installed. Does that help?
Click to expand...
Click to collapse
What I did was to download firefox portable, you can google it (and if you want you can copy it to an USB drive).
If you go to firefox networking setting, you can try to change the options in advanced with "no proxy" or as wisefire said just write an IP proxy address with the correct port, you should be able to visit any website.
At least this was working flawlessy for me..
yukinok25 said:
This is a REALLY good explanation Pulser, I always liked the way you answer to the people on XDA! (specially on the Hero thread )
By the way, why an .exe file would infect a machine? Do you mean any kind of .exe? Even from a well known company, who create safe and populars software?
I used to run, without tell anyone, firefox portable in my office to bypass firewall restrictions, is that dangerous as well?
Click to expand...
Click to collapse
Only a malicious exe would cause trouble...
But on a shared school network, who knows what the user before you used...
That's why I use disk freezing software on systems I run, and a forced reboot between logins, to give you a clean environment.
But while employees run portable firefox, what if they were to use it on another pc, and it had a virus, which infected the exe?
TBH, flash drives shouldn't be used in work environments, that were used outwith that environment... But that's not realistic in a school.
johnston9234 said:
i have special access to .exe and Command prompt just because of the position i am in as a student (several Technical courses). I can execute files on my computer and i have Chrome Installed. Does that help?
Click to expand...
Click to collapse
Come on... Surely you ain't gonna abuse that privilege? You got it because you were trusted, not to work round the restrictions that are in your acceptable use policy...
yukinok25 said:
What I did was to download firefox portable, you can google it (and if you want you can copy it to an USB drive).
If you go to firefox networking setting, you can try to change the options in advanced with "no proxy" or as wisefire said just write an IP proxy address with the correct port, you should be able to visit any website.
At least this was working flawlessy for me..
Click to expand...
Click to collapse
That would work unless they filter out proxy traffic (you can often detect SOCKS proxies and other ones that are working using this method, or even block common ports like 8080)
Back in high school we used Ultrasurf and GPass. I liked GPass because it was really easy to hide from the taskbar and notification area.
pulser_g2 said:
Only a malicious exe would cause trouble...
But on a shared school network, who knows what the user before you used...
That's why I use disk freezing software on systems I run, and a forced reboot between logins, to give you a clean environment.
But while employees run portable firefox, what if they were to use it on another pc, and it had a virus, which infected the exe?
TBH, flash drives shouldn't be used in work environments, that were used outwith that environment... But that's not realistic in a school.
Click to expand...
Click to collapse
haha, All of my schools have used disk freezing software. I thought about putting it on my parent's computer so I don't have to work on it anymore.
Eventhough I generally don't work on it anymore and just have them call someone to work on it for them. hahah.
buttes said:
Back in high school we used Ultrasurf and GPass. I liked GPass because it was really easy to hide from the taskbar and notification area.
Click to expand...
Click to collapse
Back in my days in high school we just got the many different IT and Librarian passwords/usernames and some teacher's passwords aswell. Then we'd log in to them and download Kazaa (yeah, it was that long ago lol), and downloaded like a gig or two of old NES, SNES, SEGA, Etc roms and started passing them around to everyone. haha.
It got so bad that the school threatened expulsion for everyone that had the games on their user accounts because it was overloading their network and storage space.
For a while they were just searching for the rom's extensions and you could just go and change them to a .txt and then change them back when you wanted to play them, but then they finally realized that the gig of space the roms took up were about 4 times the size of the data we were allowed to have and they could just sort the usernames by the usage of storage space.
The teacher's ones were fun to have though... it allowed you change some grades here and there...especially with my method of madness which I will not describe here. lol
pulser_g2 said:
That would work unless they filter out proxy traffic (you can often detect SOCKS proxies and other ones that are working using this method, or even block common ports like 8080)
Click to expand...
Click to collapse
So, I am really interested about this topic, is there anyway to bypass a restriction if they filter out the proxy traffic?
yukinok25 said:
So, I am really interested about this topic, is there anyway to bypass a restriction if they filter out the proxy traffic?
Click to expand...
Click to collapse
Hmmm... It's possible. If they use deep packet filtering it may be hard. But anything is possible...
I won't go into details, of getting round things, as it is my job to stop people getting round them, and I know a load of tricks, but look at the protocols in use in surfing - you need LDAP/AD to log into windows domain. Then you use DNS to resolve an IP (perhaps via a corporate web proxy). Then HTTP/HTTPS to access the page.
Now think what tools the domain admins might use to administer their network - RDP? SSH? Web services on high ports?
I think I've gone into enough detail for now... I can tunnel out almost any network these days, but I don't think it is sensible, wise, nor ethical to divulge this sort of thing.
pulser_g2 said:
Hmmm... It's possible. If they use deep packet filtering it may be hard. But anything is possible...
I won't go into details, of getting round things, as it is my job to stop people getting round them, and I know a load of tricks, but look at the protocols in use in surfing - you need LDAP/AD to log into windows domain. Then you use DNS to resolve an IP (perhaps via a corporate web proxy). Then HTTP/HTTPS to access the page.
Now think what tools the domain admins might use to administer their network - RDP? SSH? Web services on high ports?
I think I've gone into enough detail for now... I can tunnel out almost any network these days, but I don't think it is sensible, wise, nor ethical to divulge this sort of thing.
Click to expand...
Click to collapse
True I am agree with you Pulser, thus I am really into this sort of things recently.
I am eager to learn..
Could you please recommend me a book or something (not too advanced) that would help me to understand better LDAP/AD, DNS and everything about security and networking?
I obviously wanna learn just for myself and I definitely don't want to spread or divulge in anyway bad behaviors..
johnston9234 said:
hey, i used to have a way around the school router blocks but i cant seem to remember what it was for the life of me. What it consisted was of an .exe that installed some software that allowed me to browse freely. I vaguely remember that the software consisted of a icon on the taskbar that was kinda an earth with fire around it....maybe?
if you have any other good router/server bypasses then please let me know. .exe file executions are blocked everywhere except in the technology building at school. Preferably i would like to have something only requiring a flash drive or it can be done within IE or Chrome.
Click to expand...
Click to collapse
if not previously mentioned, you're looking for "Tor" which comes in both installable packages or portable exe files that can be run off flash drives and includes a custom made 'Mozilla Firefox' which comes preloaded with Tor and does not save any browsing information on your client machine, thus this program is completely anon when ran from a flash drive.
www.torproject.org and you're looking for the Stable Portable Browser Bundle
Please thanks me (click thanks) if this helped
really there is a simple way
use kon-boot and bypass admin password and change the settings
kylon said:
really there is a simple way
use kon-boot and bypass admin password and change the settings
Click to expand...
Click to collapse
not if he is on a school network, he would have to physically run kon-boot on the server itself which defeats the purpose because the server would already be logged in as an admin of some kind.
-correct me if I'm misunderstanding or have missed a key post somewhere-

Bypassing web filters on android.

Hello all! I hope I'm posting this in the correct place. Anyway I'm here to ask if anyone knows how to bypass web filters on android? At my school McAfee filters any inappropriate websites, this includes forums, blogs, and things of that nature. I tried using Orbot but I'm stuck setting it up. Any help will be appreciated.
You can use tunnelguru.com to browse everywhere you want, if the website is allowed within the mcaffee policy
Oh cool, I'll give that a try. Thanks for your response!
The website was blocked :/ any other suggestions?
Do you want something that is free?
You could also consider setting up a tunnel from your home, but it's somewhat complicated.
vpn
Another option could be a VPN service. I've used VPNBook.com before with satisfactory results, and it should work for you too as long as the firewall doesn't block the ports that the VPN uses. I remember back in my last couple years of high school, the web filters were starting to get ridiculously strict, VPN is the only way to use legitimate websites sometimes.
Bill720 said:
Another option could be a VPN service. I've used VPNBook.com before with satisfactory results, and it should work for you too as long as the firewall doesn't block the ports that the VPN uses. I remember back in my last couple years of high school, the web filters were starting to get ridiculously strict, VPN is the only way to use legitimate websites sometimes.
Click to expand...
Click to collapse
It is possible to create your own vpn server at home and this would allow you toconnect to anything, this is possible easily as there are many guides on the internet step by step to create a vpn service. !
VPN book
W18WAR said:
It is possible to create your own vpn server at home and this would allow you toconnect to anything, this is possible easily as there are many guides on the internet step by step to create a vpn service. !
Click to expand...
Click to collapse
That also does work. It was a little tricky to set up, but I eventually got it going once myself. If you're concerned about privacy using a public VPN like VPNBook, doing it yourself could be a great alternative.
Bill720 said:
That also does work. It was a little tricky to set up, but I eventually got it going once myself. If you're concerned about privacy using a public VPN like VPNBook, doing it yourself could be a great alternative.
Click to expand...
Click to collapse
If my suggestion helped don't forget to hit thanks
There are loads of guides online for this however I cannot post links but my search query in google was "create your own VPN server at home step by step" and then i chose the top result and it is a perfect step by step guide on how to install a VPN Server in your home to use as a proxy bypass.

Categories

Resources