There may be many restrictions on LAN Internet users, such as websites, games, MSN, and port restrictions, which are usually restricted by software on the proxy server, for example, the most talked ISA Server 2004, or the hardware firewall is used for filtering. The following describes how to break through the restrictions:
1. Some websites cannot be accessed, and online games (such as the Internet) cannot be played. These restrictions generally restrict the IP addresses to be accessed.
This type of restriction can be easily broken through. You can use a common HTTP proxy or SOCKS proxy. Now it is easy to find an HTTP proxy on the Internet. You can easily access the target website by adding an HTTP proxy to IE.
2. Some protocols are restricted, such as the failure of FTP, and the restriction on the server IP addresses of some online games, which do not support common HTTP proxies.
In this case, you can use SOCKS proxy and Sockscap32 software to add the software to SOCKSCAP32 and access it through SOCKS proxy. General programs can break through the restrictions. For some games, you can consider the Permeo Security Driver software. If SOCKS is restricted, use socks2http instead of HTTP.
3. restriction based on packet filtering or some keywords are forbidden. This type of restriction is strong. It is usually filtered by the proxy server or the hardware firewall. For example, we use ISA Server 2004 to disable MSN and perform packet filtering. Such restrictions are hard to break through, and ordinary agents cannot break through them.
Because of the packet filtering, this type of restriction can filter out keywords, so you need to use an encrypted proxy. That is to say, the data stream of the HTTP or SOCKS proxy in the middle is encrypted, such as stepping stone, SSSO, and FLAT, as long as the proxy is encrypted, it can be broken through. With these software and then with Sockscap32, MSN can be used. This type of restriction does not work.
4. Port-based restrictions restrict certain ports. The most extreme condition is that only port 80 can be accessed, so you can only view the webpage, even OUTLOOK receiving and FTP restrictions. Of course, the principle of breakthrough is the same for limiting several special ports.
This restriction can be broken through the following methods:
1. Find the common HTTP port proxy, 12.34.56.78: 80. For example, with socks2http, replace the HTTP proxy with the SOCKS proxy, and then use SocksCap32 to easily break through. The proxy used in such breakthrough measures is not encrypted. Tongtong software also has this function.
2. Use FLAT software and SocksCap32, but the FLAT proxy should be port 80. Of course it doesn't matter if it is not port 80, because FLAT also supports access through common HTTP proxy, if it is not port 80, you need to add an HTTP proxy with port 80. This kind of breakthrough method uses proxy encryption, and the network management does not know what the data is in the middle. The proxy stepping stone can also be done, but the proxy still needs port 80. For port 80 restrictions, some port conversion techniques can be used to break through the restrictions.
5. The preceding restrictions are comprehensive, such as IP address restrictions and restricted keywords, such as MSN mails and port restrictions.
Generally, the second method in the fourth case can completely break through the restrictions. As long as Internet access is permitted, all restrictions can be broken.
6. Another scenario is that you cannot access the Internet at all, and you are not granted the permission or IP address to access the Internet, or the IP address is bound to the MAC address.