NOT YET OPERATIVE
Warning: proxies.htm page not yet 'consolidated'
Back to the [proxy.htm] section

You can already use the following (and - of course - anything else "about proxies" that you'll find on my site as well) but this is still a complete and unorganised mess that I intend to re-order asap.
In the mean time either you go and study some other lore or you read this and try to see what you can do - all alone on yourself - with the following knowledge snippets... eheh

[Other interesting snippets]

Vlad's site allows for port 81 proxy 
searches  

proxy search:
http://prx3.virtualave.net/cgi-bin/sps.pl?pattern=%3B81%3B&max=50&nskip=0&file=proxlog.csv
       
gives plenty of them. All recent. All port 81. They can't all be dead. 

It can be used to search for port 82 (change the pattern to %3B82%3B) as 
well, but of the many checks done, it only gives 3 (two are already on 
my page and the other one is censored anyway).

You can always just go to http://prx3.virtualave.net/cgi-bin/sps.pl, of 
course and do the searches. But his search pattern has bugs, so things
like ;8[2-9] don't seem to work.  

I tried various ways to get it to search on 
NOT (8080, 80, 3128 ...) once, but the facility didn't seem to be there. 

A search for port 9000 gave one... invest.nnov.city.ru:9000
I'm sure there are many more on the unblocked ports listed on my page.
If someone went through these and posted the results, it would be a
Good Thing 
                      


if you add certain ascii character after the .com, .net, etc... of an URL such as http://www.sex.comþ it'll get right past my ISP's proxy. so far i haven't found one that works with everything. they can also be combined with the Dword proccess. so even though http://3483057532/ is blocked, http://3483057532ü/ isn't... have checked a number of sites using this method (www.playboy.comô, www.penthouse.comô etc), and they seem to work! i was checking using a suffixed ô (Alt-147). Sometimes it didn't work, maybe to do with particular servers in the proxy array??? again, anyone have any ideas on this?
I once used %a0 at the end like that. But then they fixed the problem. Surprised to hear it's back! The thing that always amazed me was that the DNS servers returned the right address when the proxy sent them that weird string! It's a painful (and unreliable from what you say) way to access the internet though.
Here are the results from Saudi http://www.sex.comþ fails the proxy's DNS lookup http://3483057532/ is blocked http://3483057532ü/ is rejected by the proxy
Remember that even mediocre admins have you by the throat though. EVERY packet you send out must go through a machine under their control. They just need to: 1) notice it 2) ask their (smarter) consultants what to do about it. 3) do it. and you're fscked.
Check your own IP address and netmask to see > > if you are on the same subnet as one of the 'internet enabled' machines > > which is off. Then change your IP address to the IP address of that machine! > > But, the problem is that I don't know what IP have the right! I f I would be able to know that ... Have you ever used a network sniffer? IIRC, even l0phtcrack will tell you about what's happening on your net. It should be easy to see these guys - they'll be the ones using the network bandwidth (when they are on, and web surfing). Try around lunch-time or the last hour of the work day. These are usually the guys who don't really need to work for a living :-) The ones who are powered off and never surf, but still 'internet enabled' will be hard to find. If you prefer to use one of these we'd have to do some IP spoofing tests. Maybe the easiest (time-consuming, but technically easy) way to do this would be for you to ping (starting) at the beginning of the subnet IP address range, see if anyone is there, change your own IP address to that address, and see if you get internet access. For NT at least this IP address change is a quick thing - not sure about win9* I don't know how much time you have to bang on this ... > > If the machine you want to 'impersonate' is still powered on and booted > > up, then if you try to use his address there may be alarms going off > > everywhere. Be careful - that's just a bit too obvious. > > OK, I know that. Good. > Well, I hope you go on helping me. At the moment the "mediocre" admins won. Well yeah, only because you need some 'hacker' education :-) And that always takes time, hey? It took me years. They have the upper-hand in the first place. It's kinda like attacking a castle with a moat and all.
Alstone version 0.32 is out and it can append strings to hostnames. This version could be of interest to persons inside the UAE. How to URL-encode and URL unencode Type into the webbrowser javascript:alert(escape("ô")) javascript:alert((w = window.open(),w.document.write(escape("ô")),w.document.close())) javascript:alert(unescape("%F4")) javascript:var w = window.open();w.document.write(unescape("%F4"));w.document.close() ------------------------------------------------------ Sample use of the proxy: S:\aznlp>java Alstone -h The Alstone Java proxy 0.32, 10-Feb-00. Usage: -n Near_port -f,-r [far_hostname_or_IP:]far_port -x Hostname 0xHH.0xHH.0xHH.0xHH encoding (default = 4294967296 encoding) -z %FF String to append to hostname. (String is first URL decoded) -s Server/decode mode (defaults to client/encode mode) (Desertweed Research, http://www.ijs.co.nz/pml.htm, research@ijs.co.nz) S:\aznlp>java Alstone -n 84 -f 85 -z %f4 Client_Mode = true, Encoding_Mode = '4294967296', Tail = 'ô' Listen = 84, Remote = localhost:85 ------> www.kacst.edu.sa ---> 3558485005ô <------ ------> ****blocked**** ---> 3489041000ô <------ If a client and server are connected, then the proxy converts hostnames to IP numbers. At 04:09 09.02.00 , Craig Carey wrote: >The proxy now would change a browser request for: >http://etisalat.charges.too.much.net/discussions/charges/index.htm >into this: http://3471288708/discussions/charges/index.htm > ... Download! alstone_proxy_032.zip (about 76KB, source code, free) > >> http://www.altern.org/research/code/ >> http://www.is.co.nz/code/ > >Java would be needed too. // To run this program // Option 1, run it without changing the code: // http://java.sun.com/products/jdk/1.1/jre/index.htm (2.6MB) // // Option 2, run and be able to modify the code // http://oss.software.ibm.com/developerworks/opensource/jikes/project/ // http://java.sun.com/products/jdk/1.1/ ... Craig Carey
http://www.ijs.co.nz/proxies3.htm
http://www.onelist.com/archive/proxy-methods-list
http://www.escribe.com/internet/proxy-methods/

The reason I suggested l0phtcrack is to get their passwords, so you could log into their computer and use it (install a redirector, say). You seem to be willing to take the risks involved. You might be able to get their IP address anyway, so you can use that next time they are powered off. If you can see their computer in 'network neighbourhood', so you know the computer name, you might see if nslookup with the same name resolves to an IP address (then ping to be sure). nbtstat -a may also give useful info. > > > > Have you ever used a network sniffer? IIRC, even l0phtcrack > > > No, I haven't used one. > > > > I think you should learn. > > OK. I'm going to begin with l0phtcrack l0phtcrack gives some sniffer info, but it's not really designed with that use in mind. But ok, ya gotta start somewhere.
If your ISP gives you a fixed IP number, then it might be doing thorough blocking using a firewall. You can run WINIPCFG.EXE to find out your IP number (do you have Win9x/NT?). Quite apart from the blocking, the ISP may be incompetent with matters having to do with the Internet, since it is (your say), using Microsoft's Proxy software.
Other interesting snippets

[Telnettunneling]     [030300.htm]

Back to proxy.htm

(c) III Millennium: [fravia+], all rights reserved