<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>How To Survive The Claire Perry Internet &#187; Windows</title>
	<atom:link href="/tag/windows/feed/" rel="self" type="application/rss+xml" />
	<link>https://survivetheclaireperryinter.net</link>
	<description></description>
	<lastBuildDate>Fri, 16 Oct 2015 09:30:30 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.8</generator>
	<item>
		<title>Basic DNS Filter Evasion: HOSTS file</title>
		<link>https://survivetheclaireperryinter.net/2014/01/08/basic-dns-filter-evasion-hosts-file/</link>
		<comments>https://survivetheclaireperryinter.net/2014/01/08/basic-dns-filter-evasion-hosts-file/#comments</comments>
		<pubDate>Wed, 08 Jan 2014 13:53:18 +0000</pubDate>
		<dc:creator><![CDATA[Op]]></dc:creator>
				<category><![CDATA[Censorship Evasion]]></category>
		<category><![CDATA[Filter Evasion]]></category>
		<category><![CDATA[Block]]></category>
		<category><![CDATA[BT]]></category>
		<category><![CDATA[Censorship]]></category>
		<category><![CDATA[DNS]]></category>
		<category><![CDATA[Evasion]]></category>
		<category><![CDATA[Filter]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Sky]]></category>
		<category><![CDATA[Windows]]></category>

		<guid isPermaLink="false">https://survivetheclaireperryinter.net/?p=94</guid>
		<description><![CDATA[Background: Various ISPs such as Sky and BT use DNS manipulation to spoof responses that forwards requests to their proxy server instead of the correct response. Taking BT as an example a request for a blocked site has been seen to return an IP from within this netblock instead; inetnum: 213.120.234.0 - 213.120.235.255 netname: BT-UKIP-IPV4-INFRASTRUCTURE<br /><a class="moretag" href="/2014/01/08/basic-dns-filter-evasion-hosts-file/">Continue reading...</a>]]></description>
				<content:encoded><![CDATA[<h2>Background:</h2>
<p>Various ISPs such as Sky and BT use DNS manipulation to spoof responses that forwards requests to their proxy server instead of the correct response.</p>
<p>Taking BT as an example a request for a blocked site has been seen to return an IP from within this netblock instead;</p>
<p><code>inetnum: 213.120.234.0 - 213.120.235.255<br />
netname: BT-UKIP-IPV4-INFRASTRUCTURE<br />
descr: POP<br />
country: GB<br />
admin-c: BS1474-RIPE<br />
tech-c: BS1474-RIPE<br />
status: ASSIGNED PA<br />
remarks: Please send abuse notification to abuse@bt.net<br />
remarks: New netname<br />
mnt-by: BTNET-MNT<br />
mnt-lower: BTNET-MNT<br />
mnt-routes: BTNET-MNT<br />
source: RIPE # Filtered<br />
</code></p>
<p>Sky commonly reports back with IPs from;</p>
<p><code>inetnum: 90.207.238.128 - 90.207.238.191<br />
netname: SKY-IRONMAN-VIRTUALISATION-LAN<br />
descr: Sky Network Services<br />
country: GB<br />
admin-c: BBH-RIPE<br />
tech-c: BBH-RIPE<br />
status: ASSIGNED PA<br />
mnt-by: BSKYB-BROADBAND-MNT<br />
source: RIPE # Filtered<br />
</code></p>
<p>Initial research indicates that even attempting to use 3rd Party DNS servers on some ISPs elicits a spoofed response which indicates that these ISPs are intercepting and monitoring ALL DNS queries you make. This presents a variety of concerns such as the accuracy of SPF, DNS-SEC or TXT responses but that&#8217;s a topic for another time.</p>
<h2>Circumnavigation:</h2>
<p>If you discover that you are getting faked responses and are unable to reach the correct webserver follow the steps below.</p>
<ul>
<li>Get the A Record
<ul>
<li>Navigate to a website such as <a href="http://www.dnsstuff.com/tools">http://www.dnsstuff.com/tools</a></li>
<li>Look for the DNS Lookup tool<br />
<a class="lightbox" style="line-height: 1.5;" href="/wp-content/uploads/2014/01/dns_lookup.png"><img class="alignnone size-medium wp-image-98" alt="dns_lookup" src="/wp-content/uploads/2014/01/dns_lookup-300x196.png" width="300" height="196" /></a></li>
<li>In the text box enter the URL you are trying to reach <em>(e.g. www.google.com)</em></li>
<li>Select <strong>A</strong> from the record type</li>
<li>Submit the request and make a note of the <strong>IP address</strong> returned.</li>
</ul>
</li>
<li>Edit the Hosts file
<ul>
<li>Windows
<ul>
<li>Start notepad.exe as an Administrator</li>
<li>Open C:\Widnows\System32\drivers\etc\hosts</li>
<li>Add the URL and the IP address in the format shown below;<br />
<code>173.194.34.67 www.google.com</code></li>
<li>Save the file ensuring that a file suffix <strong>isn&#8217;t</strong> appended</li>
</ul>
</li>
<li>Linux / Mac
<ul>
<li>Open /etc/hosts as the superuser with your editor of choice (vim!)</li>
<li>Add the URL and the IP address in the format shown below;<br />
<code>173.194.34.67 www.google.com</code></li>
<li>Save the file ensuring that a file suffix <strong>isn&#8217;t</strong> appended</li>
</ul>
</li>
</ul>
</li>
<li>Testing
<ul>
<li>Load up a cmd prompt (Ctrl + R, type cmd, press return)</li>
<li>Type <code>nslookup www.google.com</code></li>
<li>Ensure you receive the IP address you entered in the hosts file</li>
</ul>
</li>
</ul>
<p>&nbsp;</p>
<p>If the ISP is using BGP filtering methods, Deep Packet Inspection <em>(DPI)</em> or a transparent proxy then this still may not work as they&#8217;ll detect traffic going to the blocked IP subnet and act accordingly.</p>
<p>Keep an eye on our <a href="/top-ways-to-evade-filters/">How to Evade Blocks</a> page and follow <a href="http://twitter.com/STCPI">@STCPI</a> on Twitter for more methods to discover and evade Internet censorship.</p>
]]></content:encoded>
			<wfw:commentRss>https://survivetheclaireperryinter.net/2014/01/08/basic-dns-filter-evasion-hosts-file/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
