Campus network web free of charge, a large number of servers

The server is full and not many people are here. Please upload some pictures to see the strength.

How to solve the web authentication method on campus network?

The general campus network is free and open to students. If you are a student, just enter your student ID and password to access the Internet. If you are not, then you want to use the Internet. Also, if you don’t want the administrator or the Internet behavior management system to detect that you are on the Internet. When you go online, you want to do something shady.

In short, what you did may be illegal.

However, as a technical research, you can try the following methods, but they may not be successful:

MAC address forgery

After general WIFI verification, the user will be open for a period of time, while network identity verification usually uses a double-layer verification of the MAC address of your Internet device and Internet credentials (such as account number and password, mobile phone number and verification code). But this verification method is not a secure authentication method.

Connect to the WIFI first, and you will find that you can send and receive information the moment you connect to the Internet. You can find a scanning software and MAC address modification software online to scan the entire network to find devices that are connected to the network. Use the MAC address modification software to Change the MAC address of your network card device to a MAC address that can access the Internet.

My hand trembled as I wrote this. I opened CMD and entered "ARP -A", and saw the following information:

Through DNS and some email channels

Normally, these open WiFi devices will allow you to perform DNS queries. If you can query an external DNS server, there is a chance to establish a channel. In fact, there is similar DNS tunnel software on the Internet, you can find it on Baidu.

Another situation is that this kind of WiFi hotspot with authentication will provide password reset service. If it provides email reset, it will most likely allow you to use their network to check your email for free, and there will be an establishment. For the possibility of SSH tunneling, you can try setting up an SSH server with port number 995 or 993 (POP3 and IMAP encrypted ports) to proxy your web browsing.

ARP spoofing phishing

ARP spoofing is one of the common attack methods used by hackers. There are two types of ARP spoofing. One is to spoof the router ARP table; the other is to spoof the gateway of intranet PCs. At this time, you can create an identity authentication page that is the same as the verification interface, forcing normal users to log in to the page for identity verification, and then intercept their Internet credentials.

safety warning

Finally, I would like to remind you that the above is just for technical research, do not use it for illegal activities, and you will be responsible for any consequences.

Let me remind my friends again that you need to be careful when connecting to WIFI outside. The harm of unsafe WIFI to you is immeasurable.

For example, there is a software called "dspolit", which is an open source and professional Android platform security management toolkit. However, even such security tools can be used to monitor network data packets and steal information.

Below is a borrowed picture. Try to figure out the possible harm yourself, because most people are just "guinea pigs".

Guess you like

Origin blog.csdn.net/qq_60957671/article/details/132914526