Answer the question
In order to leave comments, you need to log in
How to bypass the content filter?
State organization. Conducted cable Rostelecom. Some kind of content filter is working, which dumps a page on blocked sites with a list of laws prohibiting access to a resource and a black cat.
Computers have a connection setting:
IP: 10.64.[hidden].6
mask: 255.255.255.128
gateway: 10.64.[hidden].1
In the settings of the local network settings, there is a proxy server for local connections 10.0.64.52:3128
I've already tried everything. Even GoodbyeDPI. Nothing helps. When connecting VPN or TOR does not open pages at all.
The ping and tracert commands also lead nowhere.
How to win?
Answer the question
In order to leave comments, you need to log in
I am writing a solution that I found a long time ago. It turned out to be impossibly simple and lay at hand.
First, I note that even then I noticed that with all these filters, I could easily connect to another computer through TeamViewer. This is of course a "crutch", but he made me look at the problem differently.
In short, I took the wonderful program SoftEther VPN Client Manager, which I have been using for a very long time, and stupidly configured it to connect to VPN servers through the proxy of the same filter box - in my case it is 10.0.64.52:3128
Everything. Again, we rejoice at the free Internet.
Without knowing the "specifics" it is difficult to offer a specific solution. Here is the knowledge base of Habr on the topic of bypassing ILV locks:
The program that determines the type of site blocking in pr ... 2014
* Knowing the type of blocking helps to find the best solution to bypass it.
Rostelecom website blocking mechanism research... 2015
Transparent bypass of blocking in the home network 2015
An autonomous way to bypass DPI and an effective way ... 2017
Configuring BGP to bypass blocking, or "How I ... 2018
Sincere Mikrotik against the soulless ILV and the same ... 2019
Bypass ILV locks using DNSTap and BGP 2019
-Rostelecom already uses DPI for blocking , so you need to look at methods against it.
- They should not cut VPN by port numbers and type of packets - all work of corporate remote offices will be disrupted. They can only block access to some VPN providers. But no one forbids renting a server on Amazon and raising a VPN through it.
PS: As always on Habré - the most interesting thing happens not in the article, but in the comments to it.
PPS: a magic link with the addition of site:habr.com at the end - gives 99% of the answers to any technical questions.
I understand correctly that you desperately want to know how effectively the IT security service works in this state organization of yours (and if it doesn’t exist, then just the security service)? The acquired knowledge may affect the bonus / career / further work - depending on what kind of office and what position you have inside it.
It may well be that all traffic to the outside is prohibited from you - I would do just that. Internal mail server and internal proxy, but outside - just nothing at all.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question