SlideShare a Scribd company logo
Hello folks…
This document is for all the people who have wifi(wireless fidelity) in their
colleges.
(You can read it even if you don’t have)
I kept every thing including basics and images…
(Every image is a screenshot from my system only.. Not copied from anywhere)
I have successfully opened blocked sites in my college using all the methods I
mentioned In this document..
I specified “FACEBOOK” as an example of blocked site in the entire document..
If I miss any thing try googling or make a comment..
Queries and comments at cnuhackz@gmail.com
or our ethical hacking group on facebook
regards
-cnu
The following figure shows the current position in my
college if we open facebook directly.
It is being blocked by the network administrator using
firewall/proxy.
cnu
COLLEGE HACKS
ACCESSING BLOCKED SITES
The first and foremost attempt is to open our site using
secure connection i.e https instead of http.
It helps us if our site is blocked based on URL.
i.e they block http://www.facebook.com, but still we can
open it using https://www.facebook.com
If it doesn’t work then go for the following methods…
PROXY
Introduction
Importance of proxy
TOR and VIDALIA
What is TOR and VIDALIA
Anonymous proxy V/S TOR proxy
Working of TOR
VPN
Introduction
Why we Need VPN?
List of TOP VPNs
SSH Tunneling
Introduction
Implementation
What is a proxy?
A proxy is an address ( IP address ) of a Server (proxy
server) that is placed between your computer and the
Internet.
It connects to the server on behalf of the client.
i.e the client will not directly connect to the server.
Without proxy
With proxy
How To Surf The Web Anonymously With Proxies
Internet explorer
Tools menu
Internet Options
connections tab
LAN settings
Use proxy
Hit ok
Manual configuration:
Get a proxy ip address by googling. And follow the steps below.
You have to place your IP address and port number there in
“use proxy”.(there are number of proxies on internet).
I kept it in the picture below…
cnu
If you feel hard to do all the above stuff..
There are so many sites to help you..
Just open any one of them.. Just enter your URL inside it.
That’s it you will be at your facebook home page…
Examples are www.opengoing.com
www.hidemyass.com
I have shown you an example with www.opengoing.com
Observe the URLs in the following two figures.
cnu
cnu
What is Tor ?
Tor-proxy is a free proxy-server service that Internet users can
use to hide their IP address while surfing the Web.
What is Vidalia ?
Vidalia is a GUI (graphical user interface) implementation for
Tor, It allows the user to start, stop, and view the status of Tor;
monitor bandwidth usage; view, filter, and search log
messages; and configure some aspects of Tor
Anonymous Proxy V/S Tor-proxy
Working of TOR
Lets consider it has taken path shown by green arrows. Now
* Node 1 knows only actual origin(client) but not actual
destination(web server).
*Node 5 neither knows actual origin nor actual destination.
*Node 9 knows actual destination but not actual origin.
Thus no one exactly knows which client is accessing which
web server. So it is highly anonymous.
So simply download TOR bundle and run “start Tor
browser”
You will be able to access blocked sites.
Download:http://www.ziddu.com/download/16392968/TorBrowser.rar.html
what is VPN?
it’s a private network which lets users to connect to other users
or remote sites using a public network
usually internet and uses “virtual” connections.
Why We Need VPN?
Full anonymity by hiding your real IP address.
Bypass geographical blocks from certain websites.
Unlike a proxy, you get secured connection for all programs
you are using.
Bypass ISP Blocking for VOIP Applications like Skype.
Quality Network ensures your VPN service will be fast
wherever you are in the world
Some Free VPN
1. UltraVPN
2. Logmein Hamachi
3. Packetix
4. Open VPN
5. Hotspot Shield
Download and install them on your machine…
SSH TUNNELING
What is SSH ?
Secure Shell or SSH is a network protocol that allows data to be
exchanged using a secure channel between two networked devices.
What is SSH tunneling?
A Secure Shell (SSH) tunnel consists of an encrypted tunnel created
through a SSH protocol connection. Users may set up SSH tunnels to
transfer unencrypted traffic over a network through an encrypted
channel.
Things you’ll need for performing SSH Tunneling:
1. First thing you need is to find a SSH server for SSH access.
2. Putty which is an open source SSH client .
http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html
First you need to register in any website that gives you a shell account
Examples are www.shellmix.com
www.cjb.net
Now download putty from the following link.. It acts as a client to our
SSH server.
Configuring an SSH tunnel using PuTTY for Windows
Run PuTTY.
On the window that appears (shown in Figure ) select the
SSH protocol and enter the address of your NetManager.
(IP address or the url you are given from the website you
have registered)
cnu
Click on the 'Tunnels' item under 'Connection/SSH' in the
category section of this window.
Enter a port number to listen on your local machine (source
port - see Figure) which will forward the requests on to your
NetManager. And then click add
cnu
Click on 'Open'. This will open a Window and ask you to
log on to your server.
Enter your username and password you are given at the time of
registration.
Once you have logged on, the tunnelled connection will be live.
Before this configure your browser.
open your browser and change few settings as shown below.
I recommend Mozilla Firefox.
1) Go to the "Tools" menu and then click "Options“
2) Now click the "Advanced" button, then click "Network" tab,
and then click "Settings"
Open Firefox and go to the "Tools" menu and then click "Options”
cnu
Now enter "localhost" as the Socks Host and your port number,
as "8888" into the Port field as shown.
cnu
Now we are enjoying in our college by bypassing the
firewall/proxy.
See the pic below…
If you observe the following figure at right bottom corner..
You will see I have wifi access…
cnu
Enjoy hacking
Thank you..
Don’t forget to comment

More Related Content

Similar to Accessblockedsites

Ultrasurf
UltrasurfUltrasurf
Ultrasurf
rodel namayan
 
Backtrack Manual Part9
Backtrack Manual Part9Backtrack Manual Part9
Backtrack Manual Part9
Nutan Kumar Panda
 
Vpn 3 13_07
Vpn 3 13_07Vpn 3 13_07
Vpn 3 13_07
Swarup Kumar Mall
 
Pu t ty
Pu t tyPu t ty
Pu t ty
pankajnaik83
 
Setting up a WiFi Network v3
Setting up a WiFi Network v3Setting up a WiFi Network v3
Setting up a WiFi Network v3Ali Nezhad
 
Safecrossroads ep01
Safecrossroads ep01Safecrossroads ep01
Safecrossroads ep01
simpletonsafe
 
Beginners: How to use LogMel Hamachi to Access Your Files Anywhere
Beginners: How to use LogMel Hamachi to Access Your Files AnywhereBeginners: How to use LogMel Hamachi to Access Your Files Anywhere
Beginners: How to use LogMel Hamachi to Access Your Files Anywhere
David Muth
 
Basics of tcp ip
Basics of tcp ipBasics of tcp ip
Basics of tcp ipKumar
 
Createlistener
CreatelistenerCreatelistener
Createlistener
oracle documents
 
Manual de autodefensa digital (INGLÉS)
Manual de autodefensa digital (INGLÉS)Manual de autodefensa digital (INGLÉS)
Manual de autodefensa digital (INGLÉS)
Stéphane M. Grueso
 
penetration testing - black box type.
penetration testing - black box type.penetration testing - black box type.
penetration testing - black box type.
luigi capuzzello
 
INFA 620Lab 4 Firewall.docx
INFA 620Lab 4 Firewall.docxINFA 620Lab 4 Firewall.docx
INFA 620Lab 4 Firewall.docx
jaggernaoma
 
WWW and Web Browser.pptx
WWW and Web Browser.pptxWWW and Web Browser.pptx
WWW and Web Browser.pptx
MagdaLo1
 
Securing Windows Remote Desktop With Copssh
Securing Windows Remote Desktop With CopsshSecuring Windows Remote Desktop With Copssh
Securing Windows Remote Desktop With Copssh
Crismer La Pignola
 
Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Vpn " Virtual Private Network "
Vpn " Virtual Private Network "
Muhammad Usman
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Manish Mudhliyar
 
Call your key to phone all
Call your key to phone allCall your key to phone all
Call your key to phone all
Gerard Fuguet
 
WWW and web browser
WWW and web browserWWW and web browser
WWW and web browser
Yansi Keim
 

Similar to Accessblockedsites (20)

Ultrasurf
UltrasurfUltrasurf
Ultrasurf
 
Backtrack Manual Part9
Backtrack Manual Part9Backtrack Manual Part9
Backtrack Manual Part9
 
Vpn 3 13_07
Vpn 3 13_07Vpn 3 13_07
Vpn 3 13_07
 
Pu t ty
Pu t tyPu t ty
Pu t ty
 
Setting up a WiFi Network v3
Setting up a WiFi Network v3Setting up a WiFi Network v3
Setting up a WiFi Network v3
 
Safecrossroads ep01
Safecrossroads ep01Safecrossroads ep01
Safecrossroads ep01
 
Beginners: How to use LogMel Hamachi to Access Your Files Anywhere
Beginners: How to use LogMel Hamachi to Access Your Files AnywhereBeginners: How to use LogMel Hamachi to Access Your Files Anywhere
Beginners: How to use LogMel Hamachi to Access Your Files Anywhere
 
Routing_Article
Routing_ArticleRouting_Article
Routing_Article
 
Basics of tcp ip
Basics of tcp ipBasics of tcp ip
Basics of tcp ip
 
Createlistener
CreatelistenerCreatelistener
Createlistener
 
Manual de autodefensa digital (INGLÉS)
Manual de autodefensa digital (INGLÉS)Manual de autodefensa digital (INGLÉS)
Manual de autodefensa digital (INGLÉS)
 
penetration testing - black box type.
penetration testing - black box type.penetration testing - black box type.
penetration testing - black box type.
 
INFA 620Lab 4 Firewall.docx
INFA 620Lab 4 Firewall.docxINFA 620Lab 4 Firewall.docx
INFA 620Lab 4 Firewall.docx
 
WWW and Web Browser.pptx
WWW and Web Browser.pptxWWW and Web Browser.pptx
WWW and Web Browser.pptx
 
Securing Windows Remote Desktop With Copssh
Securing Windows Remote Desktop With CopsshSecuring Windows Remote Desktop With Copssh
Securing Windows Remote Desktop With Copssh
 
Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Vpn " Virtual Private Network "
Vpn " Virtual Private Network "
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Firewall notes
Firewall notesFirewall notes
Firewall notes
 
Call your key to phone all
Call your key to phone allCall your key to phone all
Call your key to phone all
 
WWW and web browser
WWW and web browserWWW and web browser
WWW and web browser
 

Recently uploaded

Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
veerababupersonal22
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 

Recently uploaded (20)

Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 

Accessblockedsites

  • 1. Hello folks… This document is for all the people who have wifi(wireless fidelity) in their colleges. (You can read it even if you don’t have) I kept every thing including basics and images… (Every image is a screenshot from my system only.. Not copied from anywhere) I have successfully opened blocked sites in my college using all the methods I mentioned In this document.. I specified “FACEBOOK” as an example of blocked site in the entire document.. If I miss any thing try googling or make a comment.. Queries and comments at cnuhackz@gmail.com or our ethical hacking group on facebook regards -cnu
  • 2. The following figure shows the current position in my college if we open facebook directly. It is being blocked by the network administrator using firewall/proxy.
  • 3. cnu
  • 5. The first and foremost attempt is to open our site using secure connection i.e https instead of http. It helps us if our site is blocked based on URL. i.e they block http://www.facebook.com, but still we can open it using https://www.facebook.com If it doesn’t work then go for the following methods…
  • 6. PROXY Introduction Importance of proxy TOR and VIDALIA What is TOR and VIDALIA Anonymous proxy V/S TOR proxy Working of TOR VPN Introduction Why we Need VPN? List of TOP VPNs SSH Tunneling Introduction Implementation
  • 7. What is a proxy? A proxy is an address ( IP address ) of a Server (proxy server) that is placed between your computer and the Internet. It connects to the server on behalf of the client. i.e the client will not directly connect to the server.
  • 9. How To Surf The Web Anonymously With Proxies Internet explorer Tools menu Internet Options connections tab LAN settings Use proxy Hit ok Manual configuration: Get a proxy ip address by googling. And follow the steps below. You have to place your IP address and port number there in “use proxy”.(there are number of proxies on internet). I kept it in the picture below…
  • 10. cnu
  • 11. If you feel hard to do all the above stuff.. There are so many sites to help you.. Just open any one of them.. Just enter your URL inside it. That’s it you will be at your facebook home page… Examples are www.opengoing.com www.hidemyass.com I have shown you an example with www.opengoing.com Observe the URLs in the following two figures.
  • 12. cnu
  • 13. cnu
  • 14.
  • 15. What is Tor ? Tor-proxy is a free proxy-server service that Internet users can use to hide their IP address while surfing the Web. What is Vidalia ? Vidalia is a GUI (graphical user interface) implementation for Tor, It allows the user to start, stop, and view the status of Tor; monitor bandwidth usage; view, filter, and search log messages; and configure some aspects of Tor
  • 16. Anonymous Proxy V/S Tor-proxy
  • 18. Lets consider it has taken path shown by green arrows. Now * Node 1 knows only actual origin(client) but not actual destination(web server). *Node 5 neither knows actual origin nor actual destination. *Node 9 knows actual destination but not actual origin. Thus no one exactly knows which client is accessing which web server. So it is highly anonymous. So simply download TOR bundle and run “start Tor browser” You will be able to access blocked sites. Download:http://www.ziddu.com/download/16392968/TorBrowser.rar.html
  • 19.
  • 20. what is VPN? it’s a private network which lets users to connect to other users or remote sites using a public network usually internet and uses “virtual” connections. Why We Need VPN? Full anonymity by hiding your real IP address. Bypass geographical blocks from certain websites. Unlike a proxy, you get secured connection for all programs you are using. Bypass ISP Blocking for VOIP Applications like Skype. Quality Network ensures your VPN service will be fast wherever you are in the world
  • 21. Some Free VPN 1. UltraVPN 2. Logmein Hamachi 3. Packetix 4. Open VPN 5. Hotspot Shield Download and install them on your machine…
  • 23. What is SSH ? Secure Shell or SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices. What is SSH tunneling? A Secure Shell (SSH) tunnel consists of an encrypted tunnel created through a SSH protocol connection. Users may set up SSH tunnels to transfer unencrypted traffic over a network through an encrypted channel. Things you’ll need for performing SSH Tunneling: 1. First thing you need is to find a SSH server for SSH access. 2. Putty which is an open source SSH client .
  • 24.
  • 25. http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html First you need to register in any website that gives you a shell account Examples are www.shellmix.com www.cjb.net Now download putty from the following link.. It acts as a client to our SSH server.
  • 26. Configuring an SSH tunnel using PuTTY for Windows Run PuTTY. On the window that appears (shown in Figure ) select the SSH protocol and enter the address of your NetManager. (IP address or the url you are given from the website you have registered)
  • 27. cnu
  • 28. Click on the 'Tunnels' item under 'Connection/SSH' in the category section of this window. Enter a port number to listen on your local machine (source port - see Figure) which will forward the requests on to your NetManager. And then click add
  • 29. cnu
  • 30. Click on 'Open'. This will open a Window and ask you to log on to your server. Enter your username and password you are given at the time of registration. Once you have logged on, the tunnelled connection will be live. Before this configure your browser. open your browser and change few settings as shown below. I recommend Mozilla Firefox. 1) Go to the "Tools" menu and then click "Options“ 2) Now click the "Advanced" button, then click "Network" tab, and then click "Settings"
  • 31. Open Firefox and go to the "Tools" menu and then click "Options” cnu
  • 32. Now enter "localhost" as the Socks Host and your port number, as "8888" into the Port field as shown. cnu
  • 33. Now we are enjoying in our college by bypassing the firewall/proxy. See the pic below… If you observe the following figure at right bottom corner.. You will see I have wifi access…
  • 34. cnu
  • 35.