bypass School Internet Filters
I’m not the best with introductions so I guess ill just get right into it, I did some research in Proxies and Web filters and this is what I have found.
This is the most simple of them all but sometimes does not to work. It’s as simple as just adding an S on to the http. so lets say for example http://www.facebook.com/ you would change it to https://www.facebook.com/
this does not go under the category of a hack it is just something that I thought would be interesting to share with those that want to bypass a Schools Internet security. enjoy!
*Admin: Original source is http://howto.wired.com/wiki/Bypass_School_Internet_Filters*
As I walk through the valley of the shadow of death, I will fear no evil, for I am the Evilest mother fucker in the God damn valley.
“When you die I will laminate you’re skeleton and pose you in the lobby.”
Veni Vidi Vici
“When you die I will laminate you’re skeleton and pose you in the lobby.”
Veni Vidi Vici
https://hidemyass.com often works in schools.
If school server running on linux, computers can boot with linux OR windows, it might be the same as in my school:
HTTPS isn’t blockable in the firewall.
all HTTPS-sites are blocked here:
C:\Windows\System32\drivers\etc\HOSTS.
just delete the list of blocked websites, save document and restart firefox. Then it isn’t blocked in HTTPS anymore ;)
*even https://www.facebook.com/ maybe won’t work if it’s blocked there!
Miep…
For everyone who doesn’t know it:
If CMD is blocked on school computers, just write the commands nito a .bat fail and execute it!
And if everything fails, buy yourself an internet stick xD>>
Miep…
- daMage
Unfortunately it’s true for some school filters DaMage well cache filters at least . It depends on how the filter works, some like what p2 is talking about cannot block HTTPS for example the RM SmartCache cannot block HTTPS. I tried before when we used this and it ended up blocking the whole schools internet… Yes they loved me for it :)
I could be wrong but I believe this happens because the web pages are cached then served from the cache rather than being downloaded again, therefore when viewing a page via a secure connection the cache does not store it and allows access and also bypasses URL/word filters. Please correct me if I’m wrong :D
A cache is designed to store pages visited by its users. The process of storing web pages is known as ‘caching’. This means that once a page has been visited it is saved in the cache’s memory and hard drive, so that when a page is next requested, it can be served from the local cache rather than the Internet. There are major benefits that schools can gain by having an RM SmartCache.
I would love to change the world, but they won’t give me the source code.
RM SmartCache != Firewall
The “problem” with https is that you can’t see what is the dns name of the web site someone is accessing, because that information is also encrypted. But you can see the ip addresses and if someone claims to have a firewall that can’t block connections by ip-address, I can only say that they don’t have a firewall.
- daMage
This makes sense, I have noticed a lot of schools that I have worked in use cache filters and not firewalls due to price and with authorities and the government lowering school budgets I don’t see this changing soon.
I would love to change the world, but they won’t give me the source code.
my teacker gave up trying to block internet, because I always found a way to go onto facebook and other sites.
after giving up, he once told me, that my ways of getting onto fb only work, because he ccannot block https-sites except using hte HOSTS-document.
Miep…
Miep…
A little bit more information to clarify…
The hosts file is present in every computer running TCP/IP (you can even see it on android…). It’s not related to protocols and it is only use to resolve domain name to IP address. No matter what protocol you use (ICMP, FTP, HTTP, etc.), every time you ask for a server name, you computer will first look there to resolve it. Then it will look in the local dns and then in external dns…
It’s possible to block a web site by entering something like “0.0.0.0 www.facebook.com” (no wildcard). But except if your school doesn’t have a local dns server… there is no reason to struggle maintaining hundreds of hosts files. Especially if users can change it so easily. The same entry in the local dns server would do the same and it’s easier to maintain. Yet, it’s still better to block this in the proxy/firewall server than in the dns server. No matter how poor your school is, you should (or not) talk about linux to the IT guy…
NOTE: If you can hack the hosts file, you should rather use this to redirect everyone that wanna use facebook to your own web site so you can steal their passwords! ;) Mouhahaha
Secundo, I don’t know how great is our proxy server but we can inspect every request sent no matter what protocol is used (except if we allow VPN connection), SSL included. I clearly see the server name and I doubt it’s relying on reverse dns… Since the proxy is between the client and the web server (impersonating the client), I think it’s possible to see the flow…
Finally, except if you are directly NATed to the outside, I doubt that any admin will allow dns traffic to pass through the proxy/firewall server…
With that said, I must say that the original post give pretty good advice. Especially about creating your own proxy server… But use a strong password or I might want to use it myself! ;)
DaGr8
Just because I am paranoid doesnt mean theyre not after me…