November 25, 2007

PROXY | CIRCUMVENTORS | TUNNELLING to access RESTRICTED SITES !!



RESTRICTED SITE ACCESSED , PAGE BLOCKED BY ADMINISTRATOR , ACCOUNT LOCKED UNAUTHORISED ACCESS etc

Have you ever been annoyed by your organisation,workplaces, etc while trying to access certain sites.Well !! there are lot many ways to overcome this issue. Generally the organisation,workplaces have filters to block you from accessing some sites from their network . When users try to access a web page, the filtering software checks its list database and blocks access to any web page on that list. If keyword blocking is enabled, the software will check each web page (the domain, URL path and/or body content of the requested page) and dynamically block access to the web page if any of the banned keywords are present.

The following is the solution which change from scenario to scenario. Choose accordingly and act stealthly... ;)

PROXY SERVERS :

Proxy servers are those which act inbetween your web browser and the server and acts as a buffer. It can carry out many requests such as HTTP ,FTP and SSL Service too.
here are some proxy servers and softwares...


S
quid is free proxy server software and can be secured with Stunnel server.

Proxy servers with encryption enabled are best for the users in the corporate as they have their session secured..


Here are some open proxies which are left open for connections from remote servers...


TUNNELLING

Tunneling, also known as port forwarding, allows one to encapsulate insecure, unencrypted traffic within an encrypted protocol. The user in a censored location must download client software that creates a tunnel to a computer in a non-filtered location. The normal services on the user’s computer are available, but run through the encrypted tunnel to the non-filtered computer which forward the user’s requests and their responses transparently.

When using free tunneling services users should note that they often include advertisements. Requests for the advertisements are conducted through plain text HTTP requests which can be intercepted by any intermediary who can then determine that the user is using a tunneling service. Moreover, many tunneling services rely on the use of socks proxies which may leak domain name requests.

- www.http-tunnel.com
- www.hopster.com
- www.htthost.com



  • Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.
  • JAP makes it possible to surf the Internet anonymously. Instead of connecting directly to a web server, users take a detour, connecting with encryption through several intermediaries, so-called mixes.
  • Freenet is free software which lets you publish and obtain information on the Internet without fear of censorship. It is entirely decentralized and publishers and consumers of information are anonymous.
OF all these Freenet is the most recommended one i would like to prefer.

CIRCUMVENTORS :

circumvention technologies work by routing a user’s request from a country that implemented filtering through an intermediary machine that is not blocked by the filtering regime. This computer then retrieves the requested content for the censored user and transmits the content back to the use.

Following are some public web-based circumventor. People with low security can make use of it and High profile organisation have these sites in their blocked list already. Using these sites doesn't require much expertise.

http://www.anonymizer.com
http://www.unipeak.com
http://www.anonymouse.ws
http://www.proxyweb.net
http://www.guardster.com
http://www.webwarper.net
http://www.proxify.com
http://www.the-cloak.com

Always the circumventors with SSL is recommended as your session will be encrypted. There are some circumventors web based softwares which require some expertise to configure them..
Some sites like peacefire do have a email list when subscribed will send you list of new circumventing sites.. If your employer too subscribes this.. All your works are then castles in the air. [:)]

some WEB BASED CIRCUMVENTING SOFTWARES

CGIProxy: A CGI script acts as an HTTP or FTP proxy.
Peacefire’s Circumventor: An automated installer program that makes it much easier for non-technical users to install and configure CGIProxy.
pHproxy: An experimental, highly configurable web-based circumventor.
Psiphon: An SSL-enabled webserver with built-in web-based circumventor.

Hope you enjoyed your stay . Do have your say in comments......
If you like my blog u can subscribe here






Add this as bookmark to ....


No comments: