This document provides instructions for accessing blocked websites like Facebook in college networks by using different methods to bypass firewalls and proxies. It explains how to use secure connections, proxy servers, the Tor network and VPNs to anonymously access blocked sites. It also describes setting up an SSH tunnel using PuTTY to create an encrypted tunnel for forwarding requests and browsing privately. Screenshots demonstrate successfully opening Facebook after configuring these techniques on the author's college network.
First episode of the podcast at the Crossroads of Project SAFE. It's all about the first truly grass-roots internet with Secure Access For Everyone--the SAFE Network.
This is an approximate transcript of the first episode.
Check out www.safecrossroads.net for this episode and lots more stuff.
Beginners: How to use LogMel Hamachi to Access Your Files AnywhereDavid Muth
A step to step presentation of how to access your files from anywhere using LogMel Hamachi.
CS101 Assignment: <a> Zaman University Phnom Penh Cambodia </a>
The document aims to analyze in detail the main phases of a penetration test, in particular: how to become silent, how to performe information gathering and service information gathering, how to find exploits and how you can actually use them.
By the way … the platform used to perform the penetration test is Kali (not Kali 2.0 because at the moment it works but not perfectly)..
INFA 620
Lab 4: Firewall
Introduction
You are the Network Security Administrator for an organization. You are responsible for the configuration of a firewall that segregates the enterprise network from the external network. You will strategically allow authorized incoming and outgoing traffic while denying all unauthorized traffic.
In this lab, we going to practice setting up a Smoothwall firewall in a UMUC remote lab. Smothwall is a Linux kernel-based firewall. It has a rich graphics interface and it implements the firewall using UNIX/Linux iptables. (See http://linux.die.net/man/8/iptables). The manual for the Smoothwall firewall can be found at: http://www.smoothwall.com/media/114580/AdvancedFirewall-admin.pdf. The exercise does not require you to read the entire manual. We are going to experiment with inbound and outbound traffic filtering aspects (Chapter 7) of the firewall.
The UMUC remote environment for this lab is shown in the figure below. Notice the firewall/router separates the100.100.0.X External network (virtual Internet) from the 198.168.1.x Enterprise machines. This firewall will be controlling the in- and out-bound traffic of the enterprise.
Designed and written by Jeffrey Karlan Page 10 of 24
INFA 620 Firewall Lab ManualCopyright UMUC 2016Page 8 of 36
INFA 620 Firewall Lab Manual
Copyright UMUC 2016
Page 12 of 23
Step by Step Instructions for Performing the Lab Activity
1) From the Virtual Machine screen, double click the console for Enterprise. Use root/aspring2013 credentials to logon to Enterprise. (Note: From the Jumpbox you can also remote to Enterprise. Double click VNC Viewer. Enter remote host address 10.5.14.110 > Click Connect and use aspring2013 as the password. But the console login gives you more “real estate,” and should be preferred.)
2) This is Enterprise (Centos)
3) Double click Firewall GUI
4) Supply Username and Password and Click OK
5) This is Firewall (Smoothwall)
6) Click Networking > Outgoing. This is where you will configure rules to allow or deny network traffic from our internal Enterprise network to the External Virtual Internet.
7) Notice the Interface Defaults section the current selection is “Blocked with Exceptions”. This means that all traffic from Enterprise network to External network that is not explicitly allowed is implicitly denied. This method of administering a firewall is known as maintaining a “Whitelist”. If we were to implicitly allow all network traffic except for explicitly denied protocols it is known as maintaining a “Blacklist”. In network administration maintaining a whitelist is considered best practice.
Our Firewall has an interface on the Enterprise Internal network known as the Green Interface, and an interface on the External network known as the Red interface.
8) Minimize Smoothwall and return to Enterprise desktop
9) Double click Scripts > Double click Traffic.
10) Each of the scripts in this folder will simulate 5 packets of tra.
In this slides i have mentioned some hacking tricks which are interesting to know.. You will able to know how the sites are blocked, how to get rid of them.You will also able to crack the passwords...And some useful tricks related to facebook and mobile hacking.. i hope,You will like it...But one thing ,the tricks are old...But what i think is Old is Gold. :p
Internet Service Providers (ISP), delivers connection to the digital world and brings extra services like VoIP and other technologies which internet is the main requirement. To ensure their quality and capabilities, the equipment is delivered by them, limited in most of the times to avoid disruption and unnecessary support. Most ISP restricts the telephony service to be used with other devices, with the impossibility to expand their functionalities. The processes that we focus on this white paper is to acquire the VoIP parameters to take advantage of it.
We will demonstrate how to extract the password parameter from the provisioning mechanism used by Adamo Telecom Iberia S.A.U. (Spanish ISP). This situation motivated me to write it.
The intention is that ISP’s takes consciousness facilitating these parameters for any user who request it.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
First episode of the podcast at the Crossroads of Project SAFE. It's all about the first truly grass-roots internet with Secure Access For Everyone--the SAFE Network.
This is an approximate transcript of the first episode.
Check out www.safecrossroads.net for this episode and lots more stuff.
Beginners: How to use LogMel Hamachi to Access Your Files AnywhereDavid Muth
A step to step presentation of how to access your files from anywhere using LogMel Hamachi.
CS101 Assignment: <a> Zaman University Phnom Penh Cambodia </a>
The document aims to analyze in detail the main phases of a penetration test, in particular: how to become silent, how to performe information gathering and service information gathering, how to find exploits and how you can actually use them.
By the way … the platform used to perform the penetration test is Kali (not Kali 2.0 because at the moment it works but not perfectly)..
INFA 620
Lab 4: Firewall
Introduction
You are the Network Security Administrator for an organization. You are responsible for the configuration of a firewall that segregates the enterprise network from the external network. You will strategically allow authorized incoming and outgoing traffic while denying all unauthorized traffic.
In this lab, we going to practice setting up a Smoothwall firewall in a UMUC remote lab. Smothwall is a Linux kernel-based firewall. It has a rich graphics interface and it implements the firewall using UNIX/Linux iptables. (See http://linux.die.net/man/8/iptables). The manual for the Smoothwall firewall can be found at: http://www.smoothwall.com/media/114580/AdvancedFirewall-admin.pdf. The exercise does not require you to read the entire manual. We are going to experiment with inbound and outbound traffic filtering aspects (Chapter 7) of the firewall.
The UMUC remote environment for this lab is shown in the figure below. Notice the firewall/router separates the100.100.0.X External network (virtual Internet) from the 198.168.1.x Enterprise machines. This firewall will be controlling the in- and out-bound traffic of the enterprise.
Designed and written by Jeffrey Karlan Page 10 of 24
INFA 620 Firewall Lab ManualCopyright UMUC 2016Page 8 of 36
INFA 620 Firewall Lab Manual
Copyright UMUC 2016
Page 12 of 23
Step by Step Instructions for Performing the Lab Activity
1) From the Virtual Machine screen, double click the console for Enterprise. Use root/aspring2013 credentials to logon to Enterprise. (Note: From the Jumpbox you can also remote to Enterprise. Double click VNC Viewer. Enter remote host address 10.5.14.110 > Click Connect and use aspring2013 as the password. But the console login gives you more “real estate,” and should be preferred.)
2) This is Enterprise (Centos)
3) Double click Firewall GUI
4) Supply Username and Password and Click OK
5) This is Firewall (Smoothwall)
6) Click Networking > Outgoing. This is where you will configure rules to allow or deny network traffic from our internal Enterprise network to the External Virtual Internet.
7) Notice the Interface Defaults section the current selection is “Blocked with Exceptions”. This means that all traffic from Enterprise network to External network that is not explicitly allowed is implicitly denied. This method of administering a firewall is known as maintaining a “Whitelist”. If we were to implicitly allow all network traffic except for explicitly denied protocols it is known as maintaining a “Blacklist”. In network administration maintaining a whitelist is considered best practice.
Our Firewall has an interface on the Enterprise Internal network known as the Green Interface, and an interface on the External network known as the Red interface.
8) Minimize Smoothwall and return to Enterprise desktop
9) Double click Scripts > Double click Traffic.
10) Each of the scripts in this folder will simulate 5 packets of tra.
In this slides i have mentioned some hacking tricks which are interesting to know.. You will able to know how the sites are blocked, how to get rid of them.You will also able to crack the passwords...And some useful tricks related to facebook and mobile hacking.. i hope,You will like it...But one thing ,the tricks are old...But what i think is Old is Gold. :p
Internet Service Providers (ISP), delivers connection to the digital world and brings extra services like VoIP and other technologies which internet is the main requirement. To ensure their quality and capabilities, the equipment is delivered by them, limited in most of the times to avoid disruption and unnecessary support. Most ISP restricts the telephony service to be used with other devices, with the impossibility to expand their functionalities. The processes that we focus on this white paper is to acquire the VoIP parameters to take advantage of it.
We will demonstrate how to extract the password parameter from the provisioning mechanism used by Adamo Telecom Iberia S.A.U. (Spanish ISP). This situation motivated me to write it.
The intention is that ISP’s takes consciousness facilitating these parameters for any user who request it.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSveerababupersonal22
It consists of cw radar and fmcw radar ,range measurement,if amplifier and fmcw altimeterThe CW radar operates using continuous wave transmission, while the FMCW radar employs frequency-modulated continuous wave technology. Range measurement is a crucial aspect of radar systems, providing information about the distance to a target. The IF amplifier plays a key role in signal processing, amplifying intermediate frequency signals for further analysis. The FMCW altimeter utilizes frequency-modulated continuous wave technology to accurately measure altitude above a reference point.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Cosmetic shop management system project report.pdf
Accessblockedsites
1. Hello folks…
This document is for all the people who have wifi(wireless fidelity) in their
colleges.
(You can read it even if you don’t have)
I kept every thing including basics and images…
(Every image is a screenshot from my system only.. Not copied from anywhere)
I have successfully opened blocked sites in my college using all the methods I
mentioned In this document..
I specified “FACEBOOK” as an example of blocked site in the entire document..
If I miss any thing try googling or make a comment..
Queries and comments at cnuhackz@gmail.com
or our ethical hacking group on facebook
regards
-cnu
2. The following figure shows the current position in my
college if we open facebook directly.
It is being blocked by the network administrator using
firewall/proxy.
5. The first and foremost attempt is to open our site using
secure connection i.e https instead of http.
It helps us if our site is blocked based on URL.
i.e they block http://www.facebook.com, but still we can
open it using https://www.facebook.com
If it doesn’t work then go for the following methods…
6. PROXY
Introduction
Importance of proxy
TOR and VIDALIA
What is TOR and VIDALIA
Anonymous proxy V/S TOR proxy
Working of TOR
VPN
Introduction
Why we Need VPN?
List of TOP VPNs
SSH Tunneling
Introduction
Implementation
7. What is a proxy?
A proxy is an address ( IP address ) of a Server (proxy
server) that is placed between your computer and the
Internet.
It connects to the server on behalf of the client.
i.e the client will not directly connect to the server.
9. How To Surf The Web Anonymously With Proxies
Internet explorer
Tools menu
Internet Options
connections tab
LAN settings
Use proxy
Hit ok
Manual configuration:
Get a proxy ip address by googling. And follow the steps below.
You have to place your IP address and port number there in
“use proxy”.(there are number of proxies on internet).
I kept it in the picture below…
11. If you feel hard to do all the above stuff..
There are so many sites to help you..
Just open any one of them.. Just enter your URL inside it.
That’s it you will be at your facebook home page…
Examples are www.opengoing.com
www.hidemyass.com
I have shown you an example with www.opengoing.com
Observe the URLs in the following two figures.
15. What is Tor ?
Tor-proxy is a free proxy-server service that Internet users can
use to hide their IP address while surfing the Web.
What is Vidalia ?
Vidalia is a GUI (graphical user interface) implementation for
Tor, It allows the user to start, stop, and view the status of Tor;
monitor bandwidth usage; view, filter, and search log
messages; and configure some aspects of Tor
18. Lets consider it has taken path shown by green arrows. Now
* Node 1 knows only actual origin(client) but not actual
destination(web server).
*Node 5 neither knows actual origin nor actual destination.
*Node 9 knows actual destination but not actual origin.
Thus no one exactly knows which client is accessing which
web server. So it is highly anonymous.
So simply download TOR bundle and run “start Tor
browser”
You will be able to access blocked sites.
Download:http://www.ziddu.com/download/16392968/TorBrowser.rar.html
19.
20. what is VPN?
it’s a private network which lets users to connect to other users
or remote sites using a public network
usually internet and uses “virtual” connections.
Why We Need VPN?
Full anonymity by hiding your real IP address.
Bypass geographical blocks from certain websites.
Unlike a proxy, you get secured connection for all programs
you are using.
Bypass ISP Blocking for VOIP Applications like Skype.
Quality Network ensures your VPN service will be fast
wherever you are in the world
21. Some Free VPN
1. UltraVPN
2. Logmein Hamachi
3. Packetix
4. Open VPN
5. Hotspot Shield
Download and install them on your machine…
23. What is SSH ?
Secure Shell or SSH is a network protocol that allows data to be
exchanged using a secure channel between two networked devices.
What is SSH tunneling?
A Secure Shell (SSH) tunnel consists of an encrypted tunnel created
through a SSH protocol connection. Users may set up SSH tunnels to
transfer unencrypted traffic over a network through an encrypted
channel.
Things you’ll need for performing SSH Tunneling:
1. First thing you need is to find a SSH server for SSH access.
2. Putty which is an open source SSH client .
26. Configuring an SSH tunnel using PuTTY for Windows
Run PuTTY.
On the window that appears (shown in Figure ) select the
SSH protocol and enter the address of your NetManager.
(IP address or the url you are given from the website you
have registered)
28. Click on the 'Tunnels' item under 'Connection/SSH' in the
category section of this window.
Enter a port number to listen on your local machine (source
port - see Figure) which will forward the requests on to your
NetManager. And then click add
30. Click on 'Open'. This will open a Window and ask you to
log on to your server.
Enter your username and password you are given at the time of
registration.
Once you have logged on, the tunnelled connection will be live.
Before this configure your browser.
open your browser and change few settings as shown below.
I recommend Mozilla Firefox.
1) Go to the "Tools" menu and then click "Options“
2) Now click the "Advanced" button, then click "Network" tab,
and then click "Settings"
31. Open Firefox and go to the "Tools" menu and then click "Options”
cnu
32. Now enter "localhost" as the Socks Host and your port number,
as "8888" into the Port field as shown.
cnu
33. Now we are enjoying in our college by bypassing the
firewall/proxy.
See the pic below…
If you observe the following figure at right bottom corner..
You will see I have wifi access…