Follow us on Twitter!
Imagination is more valuable than knowledge - Albert Einstein
Sunday, April 20, 2014
Navigation
Home
HellBoundHackers Main:
HellBoundHackers Find:
HellBoundHackers Information:
Learn
Communicate
Submit
Shop
Challenges
HellBoundHackers Exploit:
HellBoundHackers Programming:
HellBoundHackers Think:
HellBoundHackers Track:
HellBoundHackers Patch:
HellBoundHackers Other:
HellBoundHackers Need Help?
Other
Members Online
Total Online: 25
Guests Online: 25
Members Online: 0

Registered Members: 82850
Newest Member: hardstylurr
Latest Articles
View Thread

HellBound Hackers | Events | General

Author

Just a Question


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 26-08-09 22:52
Is there anyway to bypass a website that has a whitelist of Proxys capable of going onto the site? Like entering the site without having to use one of the proxys on the whitelist? Just curious is all.
Author

RE: Just a Question

stealth-
Member



Posts: 1003
Location: Eh?
Joined: 10.04.09
Rank:
Mad User
Posted on 26-08-09 23:02
I dont believe thats possible. Because im assuming the server would just not respond to any packets from a improper IP address, the only way to contact it would be to spoof your IP on the packets, but in that case you still cant do much because the server would be responding to the wrong person.


The irony of man's condition is that the deepest need is to be free of the anxiety of death and annihilation; but it is life itself which awakens it, and so we must shrink from being fully alive.
http://www.stealt. . .
http://www.stealth-x.com
Author

RE: Just a Question

spyware
Member



Posts: 4192
Location: The Netherlands
Joined: 14.04.07
Rank:
God
Warn Level: 90
Posted on 26-08-09 23:04
Man in the middle attack when one of the website's visitors is using public access internet would be your best option, I think. Whitelists are ... tricky.

The other method would be attacking underlying services instead of trying to circumvent security measures.

Edit: Oh, attacking people/computers who -have- access could be pretty useful too.



img507.imageshack.us/img507/3580/spynewsig3il1.png
"The chowner of property." - Zeph
[small]
Widespread intellectual and moral docility may be convenient for leaders in the short term,
but it is suicidal for nations in the long term.
- Carl Sagan
“Since the grid is inescapable, what were the earlier lasers about? Does the corridor have a sense of humor?” - Ebert
[/s

Edited by spyware on 26-08-09 23:09
http://bitsofspy.net
Author

RE: Just a Question

stealth-
Member



Posts: 1003
Location: Eh?
Joined: 10.04.09
Rank:
Mad User
Posted on 26-08-09 23:08
spyware wrote:
Man in the middle attack when one of the website's visitors is using public access internet would be your best option, I think. Whitelists are ... tricky.

The other method would be attacking underlying services instead of trying to circumvent security measures.


yeah I was thinking man in the middle attack, but I didn't know if it was possible to do a man in the middle attack if your outside one of the targets LAN


The irony of man's condition is that the deepest need is to be free of the anxiety of death and annihilation; but it is life itself which awakens it, and so we must shrink from being fully alive.
http://www.stealt. . .
http://www.stealth-x.com
Author

RE: Just a Question

spyware
Member



Posts: 4192
Location: The Netherlands
Joined: 14.04.07
Rank:
God
Warn Level: 90
Posted on 26-08-09 23:12
spyware wrote:
Man in the middle attack when one of the website's visitors is using public access internet would be your best option,


Wait, I'm not making sense here. The whitelist won't have public access internet IP's in it. Disregard the public internet thing, you'd need to execute a MitM in someone's private, whitelisted LAN.



img507.imageshack.us/img507/3580/spynewsig3il1.png
"The chowner of property." - Zeph
[small]
Widespread intellectual and moral docility may be convenient for leaders in the short term,
but it is suicidal for nations in the long term.
- Carl Sagan
“Since the grid is inescapable, what were the earlier lasers about? Does the corridor have a sense of humor?” - Ebert
[/s
http://bitsofspy.net
Author

RE: So


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 26-08-09 23:20
What if the implement on the site was just a quick fix type of thing? Could there be errors that could be exploited? The proxys that are on the whitelist are cell phone proxys only. They seriously dont want people on computers to play there game lol.
Author

RE: Just a Question

spyware
Member



Posts: 4192
Location: The Netherlands
Joined: 14.04.07
Rank:
God
Warn Level: 90
Posted on 26-08-09 23:27
Froger wrote:
What if the implement on the site was just a quick fix type of thing? Could there be errors that could be exploited? The proxys that are on the whitelist are cell phone proxys only. They seriously dont want people on computers to play there game lol.


If you are able to connect with your cellphone, go ahead and analyse the traffic. I think it's possible to emulate being a cellphone with a computer. You can always try tethering 3G from your phone to your laptop.



img507.imageshack.us/img507/3580/spynewsig3il1.png
"The chowner of property." - Zeph
[small]
Widespread intellectual and moral docility may be convenient for leaders in the short term,
but it is suicidal for nations in the long term.
- Carl Sagan
“Since the grid is inescapable, what were the earlier lasers about? Does the corridor have a sense of humor?” - Ebert
[/s
http://bitsofspy.net
Author

RE: Tethering


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 26-08-09 23:29
Tethering would work. I was just wondering if it were possible to trick the server into thinking that my current proxy is my phones proxy is all.
Author

RE: Just a Question


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 26-08-09 23:29
spyware wrote:
spyware wrote:
Man in the middle attack when one of the website's visitors is using public access internet would be your best option,


Wait, I'm not making sense here. The whitelist won't have public access internet IP's in it. Disregard the public internet thing, you'd need to execute a MitM in someone's private, whitelisted LAN.


whitelisted lan? you'd need to know what ip's are there, with lan's, you can usually spoof it easily. if you have problems with two computers with same ip (which is usually not realy a problem), just use auditing software to boot the other person's computer, then spoof your mac address to their's and bam, you're showing up as them. you can then run a proxy sever if it was a proxy server on the network who's ip you stole, but mainly, do this, and you've got your access to the page. allow proxy in the same manner to avoid suspicion from other users.


Author

RE: Just a Question


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 26-08-09 23:37
Is it a public game for on cellular devices? Or still private etc.


Author

RE: Just a Question


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 26-08-09 23:58
Its a public game. At the moment only Boost, Verizon, and At&t can get on till they add other providers to the whitelist. The whitelist is still fairly new.