libre internet bypassing internet censorship

36

Upload: mohit-yadav

Post on 15-Jan-2015

5.769 views

Category:

Self Improvement


4 download

DESCRIPTION

The book contains almost everything to circumvent censorship of the internet firewalls. We bring power to your clicks. Every college has that frustrated IT Admin. Beat yours, a must read We unite. We fight You make us a strong community. http://technolawgyx.blogspot.in/ Tips and tricks. All for free. Absolutely!

TRANSCRIPT

  • 1. http://www.technolawgyx.blogspot.comTABLE OF INDEXACKNOWLEDGMENTS .............................................................................................1PREFACE ......................................................................................................................2CHAPTER 1 MISCELLANEOUS METHODS.........................................................4SSL Connection .........................................................................................................4IP Address Method ....................................................................................................4SSL + IP Address.......................................................................................................5GetIP Method.............................................................................................................5Google Translate Method ..........................................................................................6Mobile Simulator Method..........................................................................................7Webpage in email ......................................................................................................7Screenshot Method.....................................................................................................7Alternate Domain Method .........................................................................................8Change DNS Server...................................................................................................8Coral CDN Method....................................................................................................8CHAPTER 2 SETTING UP TOOLS..........................................................................9Setting Up Proxy........................................................................................................9Safe Testing Environment........................................................................................10Changing MAC Address..........................................................................................10CHAPTER 3 BROWSER BASED METHODS.......................................................11Opera Turbo Mode...................................................................................................11Yandex Turbo Mode ................................................................................................11Conventional Proxies ...............................................................................................11TinyProxy ................................................................................................................12Web Freer.................................................................................................................13 i

2. http://www.technolawgyx.blogspot.com UseJump...................................................................................................................13xBrowser ..................................................................................................................14Jondo ........................................................................................................................14Firefox Extensions ...................................................................................................15i) AutoProxy................................................................................................................................... 15ii) Best Proxy Switcher .................................................................................................................. 15iii) One Click Proxy IP..................................................................................................................... 15 Chrome Extensions ..................................................................................................15i) Zenmate for Google Chrome ..................................................................................................... 15ii) Hola ........................................................................................................................................... 16 CHAPTER 4 CLIENT BASED TOOLS ..................................................................18Freegate....................................................................................................................18Tor............................................................................................................................18Ultrasurf ...................................................................................................................19Hotspot Shield..........................................................................................................19Psiphon.....................................................................................................................20GPass........................................................................................................................20Your Freedom ..........................................................................................................21Spotflux....................................................................................................................21Proxpn ......................................................................................................................22VPNium ...................................................................................................................22CyberGhost VPN .....................................................................................................23Sam Proxy................................................................................................................23SecurityKiss .............................................................................................................24Open VPN................................................................................................................24PD Proxy..................................................................................................................25AutoHide IP .............................................................................................................25GTunnel ...................................................................................................................25ii 3. http://www.technolawgyx.blogspot.com CHAPTER 4 MAKING YOUR OWN PROXIES ...................................................26PHProxy...................................................................................................................26Wordpress Proxy Method ........................................................................................27Proxy using Google App Engine .............................................................................31 iii 4. http://www.technolawgyx.blogspot.comText Copyright 2014 Mohit YadavAll Rights ReservedCover Design by: Pitamber Yadav iv 5. http://www.technolawgyx.blogspot.comACKNOWLEDGMENTSThis book has been made possible only due to the following people: 1) Typical IT administrators who block YouTube to reduce load on network so that their UltraHD (4096 pixels) porn gets buffered faster 2) College Administrators, who do not understand the idea that its much more economical to provide unrestricted internet with one IT guy rather than investing in a bunch of fools (known as IT Support) and an expensive UTM (Unified threat management such as Cyberoam, Fortiguard, Sophos, Watchguard etc.) 3) Anakata for creating The Piratebay! Vive La Libert ! Vive La Internet! 4) My parents for not buying me a dongle when I asked them to do so. 5) All those a**holes who make a living by making UTMs 6) All those lowly creatures often called batch mates or colleagues who constantly pest me to sort their internet so they could satisfy their other needs. As far as the acknowledgments goes I have no one to thank for and I did it all by myself. Note: 1) If you find the language of this book disrespectful, hurtful blah, blah, its Gauravs fault. He is the editor of the book. Any fault you may find in the book in all probability is his. 2) If you find the cover disrespectful, hurtful blah, blah its not Pitambers fault. If you think its not appropriate, why dont you make us a nice cover for free and then we will talk.1 6. http://www.technolawgyx.blogspot.comPREFACE Let me begin with the usual. This book is for educational or information purposes purpose only, and by reading it any further, you agree that the author cannot be held liable for any misuse of the information provided or any kind of damage caused to any person directly or indirectly. This books sole purpose is to make ethical use of Internet and this information can be used in cases say where say your ISP receives an order to block certain videos on YouTube and it blocks the website YouTube altogether (Blocking a website is so much easier than blocking a video, dumbasses!). Or in cases where you may want to visit a website anonymously for the reasons best known to you. In plain words this simply means that if you do anything wrong making use of information given in this book it will be you who will go to jail and any person concerned with this book in whatsoever manner CANNOT be held liable. In case you disagree please dont proceed ahead and delete this book right now. This book is being provided completely free of cost and in case you bought it you were just duped. This book has been written in overly simplistic manner and in case you still face any such difficulty in using it. You should probably not read it. However irrespective whether you get anything in your head or not, dont you dare contact me with emails saying How to do this and how to do that and blah blah. Remember that I do have a life. Problem? Google it! Or wait. We have more options for you For the readers convenience, this book makes extensive use of hyperlinks. They are meant to be used with time, the hyperlink may become dead, though I will try to update them as and when I get time, but if I dont, you can always check it out yourself. Spoonfeeding is bad. I have intentionally ignored certain tools due to them being paid and expensive. In case after going through the book you have suggestions, feedback, do feel free to contact me at the blog here but I repeat dont you dare shoot a mail on how to do stuff. If you dont get it after reading the book, chances are high you I wont be able to explain it to you anyway. Who said I will be! 2 7. http://www.technolawgyx.blogspot.com In case you want to be an expert on how to Google stuff dont forget to read our article Power Searching with Google. After going through the book please do fill up this survey form here. This will help me provide you with better content in the next edition.3 8. http://www.technolawgyx.blogspot.comCHAPTER 1 MISCELLANEOUS METHODS So lets begin with easy to do methods. In this chapter we will only use method which requires little or no external aid. So there you goSSL Connection Often you will find this case, the website you are trying to open is not opening up. Sometimes the biggest problems have the simplest solutions. In the address bar of your browser type https:// (without quotes) before the URL. In case you get a warning click on proceed anyway. See if that works. Example:In case it does use this userscript to automatically redirect to SSL connection. To know how to use scripts and more such stuff read our article Setting Up Your Browser.IP Address Method In this method we will try to access the website by its IP address rather than its domain name. Windows user, go to run and type cmd without quotes and press enter. Mac users open your terminal. In the terminal/command box type ping without quotes and then name of your website without www. And press enter. E.g.:Now after the text Reply from in the above image the number that comes is your IP address. So IP address of saavn.com is 54.251.246.179 and if you will type this IP address in address bar of your browser and press enter, the site may open, depending on the way the website is being blocked.4 9. http://www.technolawgyx.blogspot.comSSL + IP Address - In this method see if you could access the website by inserting https:// (without quotes) in front of websites IP address. Press continue or select proceed anyway if you get any warning. E.g.:Dont be bothered with the red line or the cross as long as it works its fine.GetIP Method I have made a small python script which may make the life a bit easier. Download the zip file from here. Extract the contents of the file. Run the getip.exe file. Enter the url of the desired website. Dont write http:// before the name of the website; using www. is optional. Press enter and then press enter one more time to exit the program. Now where you have extracted the content of zip file you will find a newly created file link.txt Open it and you will find a link which will be http:// and then followed by a number. Use this link if it doesnt work try using https://link. Do not open the link.txt file till you exit the program.Link.txt file with its content:5 10. http://www.technolawgyx.blogspot.comGoogle Translate Method This method is pretty easy to go. Go to Google translate. In the box where you enter text to be translated select any language other than English and in the box where you get the translated text select English. Then enter the URL of the website you intend to visit where you type the text to be translated and press Translate. E.g.:This is the end result.6 11. http://www.technolawgyx.blogspot.comMobile Simulator Method Go to any mobile simulator like this and in its browser type the URL address of the website you intend to visit. E.g.:Webpage in email Running behind that timeline, and the webpage you want access to is blocked? Go to emailtheweb and enter the URL and you will get the webpage in your mail. Since the webpage loses its formatting in the email the email also gives you an option to view the page as it is. You must have a Gmail account to use this website. E.g.:Screenshot Method Go to URL2PNG and enter the URL address of the website. You will get the screenshot of the entire webpage in its all glory. To extract text7 12. http://www.technolawgyx.blogspot.com automatically out of this image rather than typing it manually. Read our series on Art of Copying and Pasting and refer to OCR part. E.g.:Alternate Domain Method There might be times when the real domain is blocked but its alternate versions such as mobile version of the website are not. So no harm in giving it a shot. ForexampleFacebookcouldbeaccessedbyusing https://m.facebook.com/, https://touch.facebook.com/ and https://blog.facebook.com/. Similarly Twitter could be used by this link https://mobile.twitter.com. Torrentz could be accessed by http://www.torrentz.li. Dont forget to try SSL.Change DNS Server Well your IT administrator may be using simple filtering tools so changing the DNS server might do the trick for you.Google Public DNSnameservers (8.8.8.8 and 8.8.4.4) are good enough. To configure them see the guide here. Using this guide you could also try changing the nameservers to Open DNS (208.67.222.222 and 208.67.220.220). In order to determine the fastest DNS nameserver use this easy to use software.Coral CDN Method - Just append .nyud.net without quotes to any website. Say for example you want to visit cnn.com then the new url becomes cnn.com.nyud.net (without quotes).8 13. http://www.technolawgyx.blogspot.comCHAPTER 2 SETTING UP TOOLS Setting Up Proxy - This is an optional chapter and only helps you in setting up your tools which will be used ahead in other chapters. This chapter is useful if you need to connect to some sort of proxy (Such as 127.0.0.1:4444 or proxy.abc.com with port 8080) before connecting it to the internet. Now most of the software this book uses have some sort of option to configure proxy settings. Something like thisBut if they dont know worries. We need to use a Proxifier then. A proxifier is a software program which can make other programs pass through a proxy server 1. So my personal favourite is Proxifier but unfortunately its paid. So use Freecap as its free. Since I havent used it myself I am willing to assume it must be pretty straightforward. Anyway its your headache now to learn how to configure it to set up your proxy settings with other programs. Go to Google and try to search how to do it.1http://en.wikipedia.org/wiki/Comparison_of_proxifiers 9 14. http://www.technolawgyx.blogspot.com You still didnt get it did you? Ok heres a guide to use Freecap with Your Freedom. Using this guide I hope you could configure Freecap to be used with other software which do not have an inbuilt proxy setting option.Safe Testing Environment This book will often ask you to install software. The author has most used most of the software recommended in the book but not all. As a result, it is recommended that you test the software in a safe manner so that no harm is made to your computer. Precaution can save you from a lot many things, including AIDS. In order to do so that you may either set up a virtual machine. Here is an excellent guide by Lifehacker which tells you how to do so. The other method is to use Sandboxie. Here are the two guides on how to use Sandboxie and what it is all about. Guide 1 (Official Guide)Guide 2Changing MAC Address If you want even more privacy and anonymity you might also want to change your MAC address. MAC address is a unique identifier assigned to your LAN card and Wi-Fi Adapter. Technitium MAC address changer is free, easy to use software for the job. Download it from here. Dont change your MAC address if your internet connectivity is restricted to your MAC address.10 15. http://www.technolawgyx.blogspot.comCHAPTER 3 BROWSER BASED METHODS Opera Turbo Mode Yes, Opera has an inbuilt proxy. All you need to do is enable the Opera Turbo mode and you are good to go. Opera Turbo Mode option is available at the bottom left corner of the browser.The blue icon in the above image looks like this when zoomed upon.Yandex Turbo Mode Similar to Opera, Yandex also features Turbo Mode. Even if Opera turbo mode doesnt work then also there is no harm in trying out Yandex. Download Yandex from here.Conventional Proxies Old is gold. Nothing beats the good old conventional proxies. You open a link in it you type the URL address and voila it runs. The problem is that most of them are blocked by default and dont work. So heres a list of some of the lesser known proxies: 11 16. http://www.technolawgyx.blogspot.com http://mirrorrr.appspot.com/http://air-proxy.us/https://www.kproxy.com/http://www.ipcamouflage.com/http://www.forwardproxy.org/www.youtubeproxy.pk/www.youtubeproxyfree.com/http://mousematrix.com/http://www.peacefire.org/circumventor/ (Proxy Lists)http://www.azproxies.com/proxy-lists/zelune-web-proxies.html (Proxy Lists)https://groups.google.com/forum/#!forum/zelune (Proxy Lists)https://launchwebs.org/ (Proxy Lists)Sharing is caring but enough usage of these will ensure that they get blocked too! Dont worry, we will come up with more.TinyProxy - It is a light-weight HTTP/HTTPS proxy daemon for UNIX based operating systems. Instructions to run it on Ubuntu are available here. There seems to be a Windows version too. I am not sure if Windowss version is the same TinyProxy ported to Windows or something completely different. No harm in trying as long as you try it out in Sandboxie or in a virtual machine. Here is the link for the windows version.12 17. http://www.technolawgyx.blogspot.comWeb Freer - It is a 2048 bit encrypted https web browser providing absolute online security and privacy. Additionally, it also opens blocked sites. It is built with the open-source Chromium models on which Google Chrome is built. It is almost as fast as Google Chrome and layout is also almost identical. Download it via CNET from here.UseJump It is a WebKit (the rendering engine used by Chrome) based browser. It was designed to stand against censorship and content filtering. It uses P2P (Peer to Peer the protocol used by torrent clients such as uTorrent) and encryption technologies based on open standards. Download it via softpedia from here.13 18. http://www.technolawgyx.blogspot.comxBrowser It is a web browser designed to run on both the Tor and XeroBank anonymity networks. It is a portable browser and could be used on a pen drive as well as on a portable hard disk. XBrowser upon exit clears all the data that was created during surfing. The surfing in this browser is bit slower than normal but secure and anonymous. Download it via CNET or Softpedia.Jondo It is an IP changer proxy tool. It can be used for anonymous surfing, anonymous e-mail, chats and other purposes. It is open source and can be downloaded for free. The best way to use Jondo is by using it with Firefox. Here is an interactive guide on how to use Jondo with Firefox.14 19. http://www.technolawgyx.blogspot.comFirefox Extensions Following are some useful Firefox extensions which might do the job:i) AutoProxy With this addon user can visit a website via proxy by adding it's domain to AutoProxy's preference. After that, whenever user is surfing, specified websites they will be automatically connected through proxy while leaving others connect directly. Available here.ii) Best Proxy Switcher It lets user set their own proxy servers or let the addon download most recently checked list from developers web site automatically for free. Available here.iii) One Click Proxy IP It lets user activate the addon with one click and then lets user browse the web with random HTTP or Socks proxy from several countries in the world. It is ad free and does not require restart of Firefox upon installation. Available here.Chrome Extensions - Following are some useful Google Chrome extensions which might do the job:i) Zenmate for Google Chrome It is a simple to use one click VPN solution. Its fast, its secure and best of all its free. It offers IP address from different countries such as Germany, US and UK. Available here.15 20. http://www.technolawgyx.blogspot.comii) Hola It is another no nonsense one click fast VPN proxy service. Its fast and durable. It started as an addon which allowed users outside US to access Hulu but now works on every website. Available Here.16 21. http://www.technolawgyx.blogspot.com. 17 22. http://www.technolawgyx.blogspot.comCHAPTER 4 CLIENT BASED TOOLS Freegate Freegate is click to run software which bypasses Internet firewalls by using proprietary P2P-like proxy network system. It uses a unique encryption and compression algorithm in its newer builds which further enhance its capabilities. It can be downloaded from here or here.Tor - Tor (The Onion Router) anonymizes internet traffic through onion routing. It is the best tool if you want anonymity and is actively used by the hacktivist group Anonymous. Through Tor you could also access onion sites and the hidden web such as the famous hidden wiki page which cannot be accessed without using Tor traffic. Best way to download and use Tor is by downloading the Tor Browser Bundle from here. Author also recommends that in case you are using Tor at a place where your internet is being monitored to check if you are using Tor you must use bridges. To know more about bridges and how to use them read more over here.18 23. http://www.technolawgyx.blogspot.comUltrasurf Ultrasurf is also one more click to run software. It is completely free and bypasses censorship and firewalls using an HTTP proxy. It employs encryption protocols for privacy. On a personal note, author has found Freegate to be bit faster than Ultrasurf in Delhi NCR area of India and Lucknow, Uttar Pradesh, India. However, the speed may vary in different places depending upon the nearest server. Also, the difference in speed between Ultrasurf and Freegate is marginal and both the software are much faster than Tor. It could be downloaded from here and here.Hotspot Shield It is a VPN software which has both free and paid versions. The free version gives a generous limit of 10 GB which is way more than required for casual surfing and could easily accommodate few downloads too. It is very easy to setup but prior to running the software you need to create a free account at the official site. It encrypts your entire traffic and is not limited to your browser. The only con is that it bombards user with ads but considering its a free software it shouldnt be an issue.19 24. http://www.technolawgyx.blogspot.comPsiphon It is another click to run circumvention system developed by Psiphon Inc. The best thing about Psiphon is that it uses all three methods VPN, SSH and HTTP Proxy to bypass firewall and thereby maximizing users chances of bypassing censorship. It is also available for Mac OS X apart from windows. It could be downloaded from here.GPass It is yet another click to run software providing for free anonymous web surfing. It protects users identity during web surfing and encrypts internet communications. It is pretty fast for a proxy tunnelling software. Once installed to launch an application using the proxy simply double-click the app from inside the GPass interface. Download it from here or here.20 25. http://www.technolawgyx.blogspot.comYour Freedom Your Freedom is another tunnelling solution for Windows, Mac OSX and Linux. It could be used to bypass proxies and access the Internet anonymously. It is completely free but in order to use it you must create an account at its official website. After creating the account, download the client software and log in using your account credentials. Then set up any proxy if your internet connection use one and search for server. After that put following proxy setting in your browser. (IP:127.0.0.1, Port:8080) In case you dont know how to change proxy in your browser read it from here.Spotflux It is another free encrypted VPN client. It is quite easy to install, but beware, as it tries to install third party software during installation so skip them. Running it is as easy as clicking enable and disable. Download it from here or here.21 26. http://www.technolawgyx.blogspot.comProxpn It is free VPN software. It provides a maximum bandwidth of 300kbps in the free account. It is quite easy to configure and you must create an online account to use it. One of its disadvantages is that it changes your browsers home page address to its website and doesnt let you change it back to something else. However that being said its free and pretty easy to use. Download it from here.VPNium It is another free VPN software and best part about it is that it doesnt require registration. The normal mode lets you take IP address from Germany but if you post a comment on VPNiums Facebook page about the software they activate the Boooost mode for free which allows you to have IP address from countries other than Germany. It works completely from your tray icon. Download it from here.22 27. http://www.technolawgyx.blogspot.comCyberGhost VPN It is another free VPN service. Post installation it could be directly used without creating an account. The connection takes some time to establish but it is pretty fast once established. Free accounts downside is ads and restriction of three hours per session. To sum it up its free, fast and secure and definitely worth your time. Download it from here.Sam Proxy This is an open source project hosted on sourceforge. Author has used it personally and it works just fine. Its easy to use and all it needs a double click on the executable file (exe). Download it from here.23 28. http://www.technolawgyx.blogspot.comSecurityKiss SecurityKiss is another free to use VPN software. They use 128-bit Blowfish algorithm for session encryption. The free version allows 300MB data transfer every day which is more than sufficient for casual surfing though downloading may be an issue. For a VPN software it takes little time to establish the connection to its server. Download it from here.Open VPN It is an open source VPN and its free. A free account needs to be created post installation to access the facility. Mac OS X Version is also available. Download it from here.24 29. http://www.technolawgyx.blogspot.comPD Proxy Another free proxy tunnelling software. You need to create an account first before using the software. User interface is intuitive and using the software will be a cakewalk for you. After running the software when it asks permission to install some drivers allow that. Download it from here.AutoHide IP Another easy to use IP changing software which bypass censorship and help user surf internet safely and anonymously. The trial limitation is that it only allows US IP addresses while the full version offers IP address from several countries. Also it has a nifty feature that the program can be set to automatically change the IP address after a certain amount of time which is quite handy. Download it from here.GTunnel Another click to run proxy tunnelling software. Its completely free, fast, secure and reliable. It uses 128-bit encryption. It could be downloaded from here.25 30. http://www.technolawgyx.blogspot.comCHAPTER 4 MAKING YOUR OWN PROXIES Well you could use plethora of software and they will be eventually blocked but what if we could make our own proxies. Wont that be cool because every time your proxy gets blocked you could make one more. So before we roll, you need to know a few basic things: a) Domain It is the name of website. Simple so Googles domain is www.google.com. If you want, you could get a free co.nr domain from here. b) Hosting So websites dont work from thin air they are kept on server from where you can access them. So in order to have your own you either buy a hosting plan or free hosting. Few free web host are 000webhost, freewebhosting, 5gbfree, and host-ed. So in order to host a proxy online you need a domain and hosting. They both may be paid or free. Free hosting is likely to be slower than paid but then who cares as long its free. For all the below mentioned tutorials I am using 000webhost you are free to use whatever host you like.PHProxy 1) So first of all go and register account at http://www.000webhost.com/.2) Now login in your account from here.3) After login, got to the file manager. 4) There you will see a file manager like one below. Click on upload.26 31. http://www.technolawgyx.blogspot.com 5) Now download this zip file from here. 6) Now click the choose file button in the Archives section (Panel on left) and upload the zip file you just downloaded. Then press the green tick button.7) Now once everything is over go to the domain of your website and you will see something like this. All done enjoy your newly made proxy.Wordpress Proxy Method In this method I will tell you how to make a wordpress based proxy. 1) Follow step 1 & 2 of PHProxy method.2) After login, go to MySQL.27 32. http://www.technolawgyx.blogspot.com 3) Fill in the information.4) Click on Create Database.5) Now save this information we will use it soon.6) Now download the Wordpress setup from here.7) Unzip the Wordpress zip file and open the wp-config-sample.php in notepad. 8) Now change database_name_here to name of your database, username_here tothe username you just used and password_here to password of your database.9) Now download WinSCP from here and install it with the default options. If somebody tells you that Filezilla is better, ignore them. 10) Now open the WinSCP client. 11) Go to sessions section.28 33. http://www.technolawgyx.blogspot.com 12) Now fill in the information required and set your protocol to FTP with no no encryption and change port to 21.13) In case you dont know what to fill in host name and user name. Go to your cPanel and click on view details. In the FTP section of view details you will get all the details except password which you should know yourself.14) Now press login.29 34. http://www.technolawgyx.blogspot.com 15) If you have filled all the blanks correctly a screen like this will appear (Image taken from here) except that you will see a bunch of php and other random files on right hand side in public_html folder.16) Delete all the files on right hand side except for .htaccess file. I repeat, dont delete the .htaccess file. 17) Now on the left hand side scroll to the folder where you have all the wordpress files. Now copy paste all the files and folders in the public_html folder just like the guy has done in the above diagram. 18) Now go to your website and wordpress will ask you to set a password. Do it. 19) Now after login, click on plugins and then click on add new.20) Now search for Repress and click on install and then activate the plugin. 21) Now go to settings where you will find a new entry repress click on it.30 35. http://www.technolawgyx.blogspot.com 22) Now add any domain say torrentz.com in the adddomain name field and click on uncensor.23) Now say your website is xyz.freeweb.com then you could access torrentz.com by using the URL http://xyz.freeweb.com/proxy/torrentz.com 24) Thats all folks its done.Proxy using Google App Engine Yes, you could create a proxy using the Google App Engine. The best part is that you get fast Google hosting for free and downside is this proxy doesnt support videos and sites which uses login. Here is a quick guide to do so. The instructions are also available in form of a video on YouTube.31