https://youtube.com/shorts/baiEHMne2XE?si=Ke6eUUam5bCt0rQl
I actually had my internet cut off before for multiple piracy complaints but noticed SSH still workedso I setup a ssh tunnel and had free internet until I moved lmao
>>107526807heh
All you need to get the free connection is a vpn and a non active cable internet connection. Set up your modem & router like you normally would but don't make a account with the provider. Instead mask your ip with the vpn causing connection to leek from the providers portal.
>>107526884mobile data is so cheap nowadays just how fucking poor are you
>>107526884Nothing in this post makes any sense.
>>107526850I had something similar but a Synology NAS got botnet malware so internet got shut off for botting abuse or something. I think they only blocked IPv4, so IPv6 still worked or something like that. I couldn't still use Google.
>>107526850they just blocked ports 80 and 443 i bet lol
>>107526850>>107526807I was a haxxor faggot before and looked at firmware of the old router they gave me and saw it was limited to 100 Mb on my router side, so I just changed one value and got 1 Gb through coaxTried doing a bridge to get access to their internal network (because I wanted to hack their TR069) because I saw some easy to hax command injection vulns on the router, but they changed it over to optic and I broke my arm and got 2 remote jobs so fuck it, stopped thinking about haxxin
>>107527114>because I sawand* I saw
>>107527114Ok
ISPs often times don't care enough to configure their networks to be airtight. in the third world, it is common for prepaid SIMs' networks to engage a captive portal once your balance has ran out to remind you you're out of balance. as it turns out, the firewalls ISPs employ to cut you off from the internet are ancient and vulnerable to different attacks: some only filter based on a plaintext http "host" header policy, e.g. "req.http.host == 'captiveportal.isp.com' ALLOW else DENY" which is very easy to turn into a vpn tunnel. some forget to block udp 53. i believe some spics spoof SNI to bypass firewalls as well. some companies offer free whatsapp and whatnot, which under the hood is simply an ASN whitelist - if you're able to spin up a server under akamai's network it is possible you'll be able to tunnel into it even if your access to the internet is limited.
>>107527141>>107526999>>107526850you guys should also look into ICMP tunnels, there is a way to put whole TCP packets inside simple ping packets (with info) and nobody is blocking ICMP or making any traffic analysis on it because of how common it is
>>107527159Ok
>>107527162thanks for responding to me
>>107527180Ok
>you can download about 100MB in 10 minutesBased on his speedtest, it would take like 30 minutes for 100MB.
>>107526807Any time there's a captive portal there's a good chance you can escape it one way or another. Usually it takes a bit more effort than this but it looks like the ISP is throttling non-subscribers to ~0.5mbit which is probably a good solution. That's just too slow for general usage.I'm surprised to see a captive portal on a fixed line connection. Does that happen a lot in the US? In my country (UK), they're widely used on mobile networks and on public wifi but I've never seen one on a fixed fibre/cable/dsl line. Instead there's just no connection whatsoever unless you pay.
XFinity used to run a botnet off of people's routers that would offer 1 hour internet trials to anyone who connected to the router's wireless Guest network. They controlled access by checking MAC addresses.One day I got so upset at Comcast I cancelled my internet subscription and I set up a script to change my MAC and reconnect to one of my neighbor's routers. I lived like this for over a year.
>>107527879I was using that crap when my mom stopped paying the bill. I had a few hacked xfinity logins so I had unlimited access. Good times. There were also the days of haxorware. The days of living in a place with spectrum where you could crack the default wpa2 keys with a word list for hashcat. I have seen a lot.
>>107526807back in my day we just phished AOL accounts for unlimited access
>>107527879Wait, the comcast free wifi is gone??? The west has fallen.
>>107527159>nobody is blocking ICMPnigger most enterprise hardware blocks pings by default
>>107530568I think he's talking about ISPs, anon...
I'm also surprised it works with the router you see in the beginning of the video. It's from spectrum.. I was using my own router, but it craped out.
>>107526884Oh yes just connect to your vpn using the src ip ???
>>107526901>paying for real estate when you can get it free.
>>107527159even if you put a TCP packet inside an ICMP packet how does that do anyhing useful for you?i dont get how you'd use this to make a tunnel
>>107527551Yeah it's more like, they just throw a bunch of cables out the ISPs window and anyone who has an account can use it, instead of carefully doing it cable by cable and knowing where each cable goes so they can toggle them.
>>107532880oh you ofc are meant to run a server on a unrestricted network i get it now
>>107526807I had a self-hosted VPN on a VPS and I used to use it for this purpose all the time.
>>107533861whyd yiu stop using it
>>107526807If you have Comcast coax coming into your house, you can already get free internet anyway. I am not eager to disclose exactly how because I don't want to draw attention to it. But anyone with some creativity and basic understanding of DOCSIS can figure it out.
>>107535280? nigger gatekeeping haxorware and whatever came after that LOL
>>107535280give hints
>>107526807>>107526884>>107526999>>107527114>>107527144>>107527159>>107535280hhahahahahahahahahaha i love this board XDDDDDDDDDDDDDDDDDDDDd
>>107532880>>107533099Yea, you just hop off from there like a VPN tunnel.Captive portals that make you pay for wifi (think airport, plane, etc), ISP spying, region blocks (Iran, China, Russia), or even ISP turning off your netSimple free tier EC2 from AWS is enough (cuz they don't charge traffic) and you're gucci for 12 monthsUsed that ICMP tunnelling plenty of times when haxxin, shits cash for exfil>>107530568>>107531326and captive portals, and few firewalls...
>>107537845>>107535839he gave you fags enough info desuRemember this weeks wacky hax (React2shell)? I saw a nigger bragging of it 6 months prior on shitcordI bet it wasn't even his method
>>107535839>>107537845You are right and I don't like to gatekeep too much. So here are some hints.Take an Arris or Motorola DOCSIS modem, even 2.0 or 3.0 will work fine. Flash Bitware, Forceware or Haxorware on it. After that it will give you access to download the configuration the CMTS pushed to you.Edit the configuration using one of the two tools that support it. They run on Linux and OSX just fine and one is open-source.In the config you will realize that the CMTS purposefully pushed you something that wouldn't work. But they crafted that config by taking a config that would work and then adding 2-3 things that would make it not work. Delete those rows. Rebuild the config. "Force" load it to the cable modem using its UI. You will have unrestricted internet access after making sure the primary equipment (your router) connected to the modem configured to ignore the DHCP provided DNS by the modem. At this configuration, you will have a semi-static IP that's mapped to the MAC addr of your primary equipment (the router). You can change your MAC addr to get a new IP from the pool.
>>107535231Got better ISP.
>>107526850>>107526884>>107526999This shit baffles me. Is it true? Maybe it’s specific to cable internet, cause obviously with fibre they have an ONT that they can just tell to turn off, but even on DSL you’d be coming in on a specific phoneline that already had a phone number attached to it, and all of them use PPPoE to manage the connection, so when you get disconnected they just ignore everything from you.
>>107526884He isn't bullshitting. It is a variant of my explanation here >>107539440.If your cable provider is particularly shit, it will work. What he is describing wouldn't work on Spectrum for example.
>>107526958oops meant to quote you on the last message here >>107542344
>>107540662Cable works differently. Config gets pushed by CMTS to your modem by the mac addr of your cable modem you registered with them. CMTS mostly trusts the cable modem, especially if it is a non-blacklisted model. Depending on how old the CMTS is, you could get away with just changing your DNS, but these days you need to modify the config manually to get rid of the hash, which they also push. So the hash that CMTS checks is part of the config they push for example. And if you remove that hash, the check is just not performed etc.