Jump to content

Want to surf the web on your work PC w/o getting caught?


ShankroidBeast
 Share

Recommended Posts

Want to be able to surf the web AT WORK and not have ANY website you go to to be detected by "the man" (proxy severs etc)?

I was in the shoutbox making a fool out of myself (as usual) and found there may be a need to do a DIY thread on how to set up your home PC (Windows XP or above) so you can access it from any PC in the world as long as you have a decent router (one that your internet provider did NOT supply) and you can do it without a static IP address (which almost everyone has a non-static IP at home and static IP's cost more)

It would be an involved and very time consuming thread to do. If there is interest I'll do it. It's really not as hard as you might think.

BTW it would be using windows "remote desktop connection" to access your PC, not some 3rd party software you have to install.

Edited by ShankroidBeast
I farted and it smelled like bacon bits
Link to comment
Share on other sites

  • Replies 83
  • Created
  • Last Reply

Top Posters In This Topic

lol ive looked at porn on a computer at work with my boss and the owner of the company before.

LOL. I'm guessing you don't work for corporate America.

When you are in any business network, believe me EVERY website you go to is monitored and it is traced back to your IP (you). And on MOST larger networks they can remotely access and WATCH every mouse click and see exactly what you see on the screen as you do it at any given time. Trust me I know I work for IT.

BTW depending on the remote software if you are in a remote session the "viewer" ofen doesn't work ;)

Edited by ShankroidBeast
I shaved my balls and now I will dip them in my piranha tank
Link to comment
Share on other sites

lol ive looked at porn on a computer at work with my boss and the owner of the company before.

this is like my company...it's the greatest thing in the world. I also spend half my day on various forums, ebay and craigslist lol

Link to comment
Share on other sites

I have a proxy setup through Google Labs. It works most of the time.

i usually don't trust going through an unknown proxy, but i trust google...intriguing, i'll have to check that out. sounds a lot easier than what I'm proposing. but then again mine works all the time.

Link to comment
Share on other sites

and not have ANY website you go to to be detected by "the man" (proxy severs etc)?

No offense but speaking as 'the man' if you fire up an outgoing remote desktop connection on my network I will get an email in seconds from MARS.

Link to comment
Share on other sites

No offense but speaking as 'the man' if you fire up an outgoing remote desktop connection on my network I will get an email in seconds from MARS.

That's exactly why you name your DNS RDP session carefully. We have lord knows how many sessions at any given time. if your DNS is named "my home boyz PC" then you will get attention. Be smart. The DNS name you choose can sail right past anyone monitoring your RDP sessions.

and...yes i'm a sneaky bastard ;)

Edited by ShankroidBeast
Link to comment
Share on other sites

That's exactly why you name your DNS RDP session carefully. We have lord knows how many sessions at any given time. if your DNS is named "my home boyz PC" then you will get attention. Be smart. The DNS name you choose can sail right past anyone monitoring your RDP sessions.

You obviously have no idea what you are talking about. First off,No security/network guy worth a crap is letting users at random make connections on tcp 3389 out of his network. Second, a good setup will be doing some sort of protocol inspection on the TCP/UDP ports that are allowed out. Thus, if you are running rdp over port 80 for instance, the firewall or proxy should be configured to drop that connection. Advanced setups will be doing MITM like SSL/TLS termination to do inspection on their users traffic leaving via secure protocols.

So basically, you are bragging about tunneling out of a poorly configured network. Do you brag about beating handicap people in track too?

Link to comment
Share on other sites

You obviously have no idea what you are talking about. First off,No security/network guy worth a crap is letting users at random make connections on tcp 3389 out of his network. Second, a good setup will be doing some sort of protocol inspection on the TCP/UDP ports that are allowed out. Thus, if you are running rdp over port 80 for instance, the firewall or proxy should be configured to drop that connection. Advanced setups will be doing MITM like SSL/TLS termination to do inspection on their users traffic leaving via secure protocols.

So basically, you are bragging about tunneling out of a poorly configured network. Do you brag about beating handicap people in track too?

Believe me you have no idea what the fuck you are talking about.

and "beating hanicap people in track too"

WTF are you talking about?

I just love how brave people can be behind a keyboad. Say that shit to my face.

Link to comment
Share on other sites

That's exactly why you name your DNS RDP session carefully. We have lord knows how many sessions at any given time. if your DNS is named "my home boyz PC" then you will get attention. Be smart. The DNS name you choose can sail right past anyone monitoring your RDP sessions.

and...yes i'm a sneaky bastard ;)

Dude, MARS or any decent packet inspector could care less about what you use in DNS. I don't care if you encrypt your traffic because I am running man in the middle on all outgoing connections. You are encrypted to my box and I am encrypted to your destination. In other words I own your encryption key on any connection you make. And then we look at exactly what the traffic is doing, we don't care about ports, we don't care about DNS. We KNOW exactly what each packet is doing, we know what websites you are typing into IE on your home box.

You may be ok because there are a bunch of people doing legit RDP on your network and your network people are crap or don't care, but I can tell you from a couple of decades of running big networks that out going RDP is NOT the norm on a business network and when it shows up on a standard business network IT people freak out and start killing people.

You telling people your system is fool proof is irresponsible, you are going to get people fired.

Link to comment
Share on other sites

Believe me you have no idea what the fuck you are talking about.

and "beating hanicap people in track too"

WTF are you talking about?

I just love how brave people can be behind a keyboad. Say that shit to my face.

You are bragging about not getting caught doing something on a shitty network. That would be similar to bragging about beating a guy with a prosthetic leg in a 100m track event.

In any event, I know exactly what I'm talking about and the few IT/Security types on this board will back me up 100%. Oh and I have no qualms about calling you a dumbass in person.

Link to comment
Share on other sites

Dude, MARS or any decent packet inspector could care less about what you use in DNS. I don't care if you encrypt your traffic because I am running man in the middle on all outgoing connections. You are encrypted to my box and I am encrypted to your destination. In other words I own your encryption key on any connection you make. And then we look at exactly what the traffic is doing, we don't care about ports, we don't care about DNS. We KNOW exactly what each packet is doing, we know what websites you are typing into IE on your home box.

You may be ok because there are a bunch of people doing legit RDP on your network and your network people are crap or don't care, but I can tell you from a couple of decades of running big networks that out going RDP is NOT the norm on a business network and when it shows up on a standard business network IT people freak out and start killing people.

You telling people your system is fool proof is irresponsible, you are going to get people fired.

edit: i never said my system was fool proof...after all i am a fool and this is proof...

I respect that. Wish i had a network I had total control of...wouldn't that be nice :D

With 8,000 w/s, 400 servers, and thousands of devices I am no where near the top.

What ever happened with your toll thing? Did I miss a post?

Edited by ShankroidBeast
I caught my ass hair on fire and had an epiphany
Link to comment
Share on other sites

I figured you were gonna tell us how to use SSH and PuTTy - why bother with RDP?

Note to self: Take two minutes to GPO mstsc.exe into obsolescence tomorrow morning...

Test tomorrow: How can you get past pay-per-surf proxies, such as found at the airport, in about 1 minute, easily?

Bonus question: What can you use to make surfing MUCH faster when using public wi-fi, at places like Panera, Starbucks, etc.? It has the additional fun feature of pissing off all the losers that hang out there all day..

Link to comment
Share on other sites

Are you posting the answers tomorrow too? Inquiring minds want to know...

Sure. It's all theoretical, of course. I in no way condone attempting to bypass $20/day surfing fees at the full service Marriott that your company is paying $250+ for a bed and no in-room coffee. ;)

Big hint: if you can ping google.com (or anything) and get replies, you're good to go.

Bonus question hint: the prog. for speedier surfing and people annoyance starts with the letter 'd'.

Link to comment
Share on other sites

I am not excluding myself but jesus this forum is nerdy. I understand all of it and don't understand why any of it is on a motorcycle forum.

My 2 cents. RDPing out of the network to surf the internet is really not a new idea, if the network guys cared to stop you they would.

Carry on.

Link to comment
Share on other sites

oh good frigging lord. the only reason i made this thread in the first place was for people in a CORPORATE environment (on a REAL network with more than 1,000 users annd more servers tan you can shake a stick at) to access ohio-riders or any other website without getting hits from your proxy (or your boss knowing every website you go to)

see if i ever try to help again.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share


×
×
  • Create New...