New on LowEndTalk? Please Register and read our Community Rules.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
Comments
problem is if the connection is going via a proxy it would probably do the DNS lookup with the proxy.
Why not try the VPN's on port 53,80 and 8080
Or you can do that for SSH.
As for dns, maybe you can try a dnscrypt enabled dns server.
And maybe you can try connecting to ssh through a socks proxy?
Whitelisted sites part is a bummer though, does this firewall work for only hand-picked web sites or what?
It seems to scan new websites when accessed and makes a permanent judgement on it. Unsure of the criteria.
You can run an SSL proxy,
Or... thinking outside the box, HAProxy to forward connections, depends on if you want "full" web access or access to some blocked sites.
Err, how about creating a dummy website and accessing it a few times before converting it to something better?
New sites are immediately blocked as "uncategorised".
Put a transparent proxy on the website and have it redirected to Google or something else common? They would scan it, conclude that it's Google and whitelist it. Afterwards you could just run an HTTP tunnel
What happens if you connect to ssh on port 443 via the proxy? It works for me at work.
Which one is it now? Does it block all new website or does it judge them? Some suggestions already have been made how to abuse that.
Can you run "dig lowendtalk.com TXT @8.8.8.8" and get a reply? If so DNS tunneling is the way out!
http://code.kryo.se/iodine/
Got a small and easy solution that works for me.
On Google Chrome on Android go to Settings > Reduce Data Usage > On
It works as a proxy, all ports are unblocked.
Or for desktop, download the extension and enable it. 'A proxy from Google!'
https://chrome.google.com/webstore/detail/data-compression-proxy/ajfiodhbiellfpcjjedhmmmpeeaebmep?hl=en
Then just use a SSH client in your browser.
Note: this worked for me.
Edit: here is my current ip from Google
http://i.gyazo.com/812331d5752bc9a178f9f0684e971520.png
Just out of curiosity: what kind of firewall is that and why do they setup something like that? As far as I know, AU is not so paranoid like China. Is it a company's or school's firewall? Home connection?
Sounds more like a very strict regulated company network, universities and schools do not go that far, even in AU.
There was a thing here in MExico, that you could use the MMS proxy from the cell phone services with a custom header, you may try it. I think it is called OpenVPN-OST, it has the option to send a custom header saying that you will connect to a whitelisted website, without doing it... something like that. Worth trying.
With Android, try VPNoverDNS, it has a Windows App too
I wonder, whether people in charge of fulfilling those rigid restrictions do read LET and this thread, particularly?
They do and probably take measures to close those loopholes.
Don't want to get into details but I've seen people who thought they are smart and tech-savvy get fired for breaching the corporate firewalls. Not saying it is exactly what OP wants to do but OP might want to think if it worthwhile to lose your paycheck for being cheap over a few bucks of mobile Internet data.
He says:
I read that as "someone in authority has given me this assignment." Not "I want to read LET at work." Maybe the OP should clarify.
Permission has been granted for audit blah blah blah.
You'd be surprised
Did you try this?
But you will probably need sshd running on port 443
Thanks, but I'm looking more for something that runs on Windows
http://www.virtualbox.org
A linux VM inside windows then?
That's an idea
Did you tried what I told you?
And ultrasurf
What did you tell me?
Ultrasurf is definitely blocked, as is TOR.
If you haven't actually changed anything within the company's systems then this would be counted as unfair dismissal. It's pretty hard to get rid of employees here unless they do something very wrong.
I this thread for all the potential vulnerabilities and attack vectors it sheds light on .......... so that they can be closed. Also, great examples for interview questions for InfoSec gigs.
( @Pwner, remember what I said about LET being a "beautiful playground" here? Here you go.)
Cheers
I see your point, and it really helps a lot. I joined this forum a while back hoping to learn more about technology. Needless to say, this is probably one of the best decisions I've ever made. :-)