Tethering question... - HTC Inspire 4G

I recently read in a post about whether AT&T can tell if you are tethering. This is the response that another user here posted:
thekurrgan said:
Truth: They can tell you are tethering via ANY conveyance that uses IPNAT.
If it uses IPNAT, then the TTL is reduced by 1 since there is another hop. This is how they tell. This little bastardly monitoring technique is deployed on all "enhanced backhaul" sites and is slowly being added to the rest of their towers that are UMTS or better. A simple defeat is using a proxy type of program.. at that point there is absolutely no way they can prove you are tethering, since all packets actually ARE originating from the phone. I personally installed a squid server and set my devices to use it.
Click to expand...
Click to collapse
My Inspire is rooted, running CM7, and I tether very seldom. I am however going to be traveling soon, and will probably be tethering much more often. Can someone kindly tell me how to set up this "squid" server, or point me to a guide somewhere? Is it an app for the phone, a tool installed on my laptop, or a combination of both? This all sounds pretty foreign to me, so any help would be appreciated..
Thanks in advance..

..........

Some more fodder on Squid:
http://www.squid-cache.org/

knarfl1 said:
Some more fodder on Squid:
http://www.squid-cache.org/
Click to expand...
Click to collapse
Thanks for the reply. I checked out that site earlier, and it was way over my head. I also noticed that you mentioned SSH Tunnel but you edited it. I actually installed that already, but have no clue how to set it up. By looking at both links, I'm assuming I need applications installed on both my laptop, and phone. Am I correct in assuming that the host name I need to enter on SSH Tunnel is the name of the squid (or other) server on my laptop?
As far as Squid goes, is there anything else out there that is a little more novice friendly in terms of installation?
I'm beginning to think this whole thing may be a little over my head, and should just tether sparingly. Guess I'm a little paranoid..

ddiehl said:
Thanks for the reply. I checked out that site earlier, and it was way over my head. I also noticed that you mentioned SSH Tunnel but you edited it. I actually installed that already, but have no clue how to set it up. By looking at both links, I'm assuming I need applications installed on both my laptop, and phone. Am I correct in assuming that the host name I need to enter on SSH Tunnel is the name of the squid (or other) server on my laptop?
As far as Squid goes, is there anything else out there that is a little more novice friendly in terms of installation?
I'm beginning to think this whole thing may be a little over my head, and should just tether sparingly. Guess I'm a little paranoid..
Click to expand...
Click to collapse
I realized SSH Tunnel wasn't much of a help so I removed it.
What the unnamed person is talking about is basically you need to have your phone point to a proxy for apps that access the mobile network.
Whether AT&T knows rogue tether users by non-ATT APNs or natted IP bounce, proxy will hide the usage and make you anonymous.
So,
You need to configure your phone to point to a proxy. Since Android doesn't have proxy features, you need to modify system files (don't want to do that) or install a proxy app (like ProxyDroid) to point to a proxy server (in the unnamed network guy's case, a caching proxy server running Squid.)
Now the question is do you have a proxy that you can point your phone to?
I've noticed PDANet tethering app (v 5.01) for iPhone now has hide usage feature. Hide usage feature is not yet implemented for Android version.
IMO, if you use the tethering sparingly, you will be ok.

Related

How to get around wifi host's restrictions?

I'm using my transformer at school and the school is providing wifi to its students. But there are apparently some odd restrictions associated with it. No app of mine is allowed to access the internet with the exception of browsers and also I'm not allowed to download anything (it just says "download unsuccesful" no matter what I download or from where). I've tried to look for a reson for this and I found out that it might be some firewall settings on the computer that is hosting the wifi, I also asked the school's IT guy and he said that it's likely to be the reason. But the thing is that all the people with computers and iPhones can use applications that use the internet with no problems at all. This makes me think that the wifi host regards me as dangerous or suspicious for some reason, and because it does allow computers and iPhones to use apps that access the internet and are allowed to download files, I think that it might be fixable. Perhaps there are some particular settings that make the wifi host's security to regard me as dangerous and doesn't allow my apps to go to the internet. So what do I have to do for my apps to be able to access the internet and to be able to download files? I really want to know this, because many of the useful apps require internet and by not using them I'm not taking the full advantage of the device. I should also mention that my tablet is running 3.2.1.
But have you tried asking them about letting you use your "netbook" on their netbook. What's the worst they can do? say NO TABLETS ALLOWED? Because unless they know your exact MAC address, they probably won't be able to do anything about it. In my old school, I brought up that I would like to connect my windows mobile device to their network (when I was using it as an mp3 player) and they said sure (they had terrible firewalls which blocked most every site that was fun). Sometimes, the best kind of hackery is the social kind.
Dyskmaster said:
But have you tried asking them about letting you use your "netbook" on their netbook.
Click to expand...
Click to collapse
What do you mean by that?
norsul said:
What do you mean by that?
Click to expand...
Click to collapse
I guess his telling you to ask for permission to use your netbook on their network.
Well first of all I'm using a tablet running android 3.2.1. And I'm kind of confused by your use of the word network, because I said that I can use the school's wifi network for students, but only to some extent, meaning that none of my apps with the exception of the browser are not allowed to access the internet e. g. android market, google translate don't work, they just say that they are unable to connect to the network or something similar. Also downloading any file from anywhere is not allowed, it says download unsuccessful. But iPhone user's apps work perfectly fine. From this I concluded that there must be something about my tablet that makes their security think my apps are dangerous and therefore blocks them, and that because there is no such problem on iOS, I thought that the might be something wrong with my end, and that it it fixable. And my question was what do I need to do to fiz this? I hope that clarifies my point.
statsminister said:
I guess his telling you to ask for permission to use your netbook on their network.
Click to expand...
Click to collapse
yes, thanks, I was kinda in a hurry when I typed that
Ask your school's IT department. Network configurations can be quite complex, and without knowledge of how or what they're blocking- it's hard for us to help. IT would know the issue better, or at least give the explanation as to why it isn't working. For instance, last year at my college nothing but computers were allowed to connect to the wifi. Such control can be done on the network side, and it may not be your tablet's fault.
Have you any friends with an Android device, or better yet android tablet?
I did ask the IT guy and he said that he has no control over the security settings, because it's a network across all of the schools in the city, not just the school in which I am.
Hey, I've tried using dropbox at school and then it says "cache access denied", maybe that can somehow clarify my problem.
settings
Have you set your settings/applications to allow unknown sources (ie is it ticked).
Colin
colint3 said:
Have you set your settings/applications to allow unknown sources (ie is it ticked).
Colin
Click to expand...
Click to collapse
That's only to allow installing apps not from the Market (sideloading). It has nothing to do with an app working or not.
Haven't you ever heard of proxy and content filtering?
Schools often set up proxies to restrict certain sites and content from working on their networks. They do it for a variety of reason, including bandwidth conservation, content filtering, network security, etc.
More than likely, they have blocked anything that they deem unnecessary. That means that probably only port 80 is allowed (the http port), possibly a few others for https, pop3 and imap for email, etc.
However, if you're a more advanced user, you can probably bypass right past all of this stuff by setting up your own proxy, or using encapsulation (like nstx or icmptx) to bypass their proxy by encapsulating other services inside DNS or ICMP traffic which are usually allowed to bypass the proxy at school. Like I said though, these are advanced techniques and require you to research and set it up yourself.
a.mcdear said:
Haven't you ever heard of proxy and content filtering?
Schools often set up proxies to restrict certain sites and content from working on their networks. They do it for a variety of reason, including bandwidth conservation, content filtering, network security, etc.
More than likely, they have blocked anything that they deem unnecessary. That means that probably only port 80 is allowed (the http port), possibly a few others for https, pop3 and imap for email, etc.
However, if you're a more advanced user, you can probably bypass right past all of this stuff by setting up your own proxy, or using encapsulation (like nstx or icmptx) to bypass their proxy by encapsulating other services inside DNS or ICMP traffic which are usually allowed to bypass the proxy at school. Like I said though, these are advanced techniques and require you to research and set it up yourself.
Click to expand...
Click to collapse
No, I do not no anything about proxy or content filtering, but I remember when I was connecting to the wifi network of the school I was asked to configure the proxy settings by putting some ip address ( I presume that it is an ip adress because it looked like one) and writing 8080 in the port field. If I didn't configure it like that, the internet would simply not work. Could you please tell me where I could educate myself about bypassing proxies or is i a matter that would require a very long time to learn and a lot of prerequisite knowledge?
And by the way, are you sure that this could be done on a tablet? All of that fiddling around seems to require a considerable degree of control which android may lack, or would rooting give me that control?
norsul said:
No, I do not no anything about proxy or content filtering, but I remember when I was connecting to the wifi network of the school I was asked to configure the proxy settings by putting some ip address ( I presume that it is an ip adress because it looked like one) and writing 8080 in the port field. If I didn't configure it like that, the internet would simply not work. Could you please tell me where I could educate myself about bypassing proxies or is i a matter that would require a very long time to learn and a lot of prerequisite knowledge?
And by the way, are you sure that this could be done on a tablet? All of that fiddling around seems to require a considerable degree of control which android may lack, or would rooting give me that control?
Click to expand...
Click to collapse
OK yeah you are going through a proxy then. The good news is, that because you have to configure it manually, they probably aren't using transparent proxy which can make it easier to bypass.
Getting nstx or icmptx working natively on Android should be possible in theory as both are lightweight and designed to work in Linux... perhaps it can be made into a module that can be activated/deactivated with a shell script, or added to a custom kernel.. obviously this would require a rooted tablet to accomplish.
The other required part of the equation is a computer accessible from the internet, which you can set up install a DNS server and nstx on.
If you manage to get it all working correctly, set your home IP address as your proxy instead of your schools proxy, and you should be able to get through. It should also work to let you access the web for free at places like Starbucks or at hotels where the web is normally routed to a site where you have to pay for web access.
Good luck!
a.mcdear said:
OK yeah you are going through a proxy then. The good news is, that because you have to configure it manually, they probably aren't using transparent proxy which can make it easier to bypass.
Getting nstx or icmptx working natively on Android should be possible in theory as both are lightweight and designed to work in Linux... perhaps it can be made into a module that can be activated/deactivated with a shell script, or added to a custom kernel.. obviously this would require a rooted tablet to accomplish.
The other required part of the equation is a computer accessible from the internet, which you can set up install a DNS server and nstx on.
If you manage to get it all working correctly, set your home IP address as your proxy instead of your schools proxy, and you should be able to get through. It should also work to let you access the web for free at places like Starbucks or at hotels where the web is normally routed to a site where you have to pay for web access.
Good luck!
Click to expand...
Click to collapse
That sounds awesome maybe you could make the app id buy it
I found two apps on the android market : proxydroid and ssh tunnel, do you think they would help me to bypass the school's proxy?
And by the way, how legal is this business? I mean I doubt that the school would send be to jail for using google translate but I'm still curious.
Legal issues are a potential problem, but its doubtful it would ever be a problem at school. Setting this up on your tablet certainly isn't illegal in itself, but if you're stealing wifi that you would otherwise have to pay for, you CAN get yourself in quite a bit of trouble if you get caught.
a.mcdear said:
Legal issues are a potential problem, but its doubtful it would ever be a problem at school. Setting this up on your tablet certainly isn't illegal in itself, but if you're stealing wifi that you would otherwise have to pay for, you CAN get yourself in quite a bit of trouble if you get caught.
Click to expand...
Click to collapse
Ok thanks, wifi network in the school is free for all students so I should be ok. But what about those apps I mentioned before?
And how would I protect myself from geting caught and what is the likelyhood of me getting caught? Can they immediately notice it if someone's trying to bypass their firewall or not? I should point out that the it manager in our school knows quite little about the sexurity system or ao he told me when I asked him whether my problem is somehow connected to their security settings, but the network is not pwned by the school, it's owned by the city and it is present in many schools beside mine, so I think that they might take their security seriously. So basically what I am trying to say is that if I investigate this matter, come there and bypass the proxy so that the youtube app works, is it likely that I am going to get caught, and if yes then what are the ways of minimising the risk (please bear in mind that I have not experience in this)? I'm asking this because I think it's not a very good idea to just walk in and hack the network without any experience and expect that there is no possibility of getting caught.
No neither of those apps are really the solution to your problem. There isn't currently an app for Android that will set up encapsulation like I'm talking about.
And yes, your IT manager at school "might" be able to catch you, but only if he's specifically looking for it. What this basically does is encapsulate your regular IP traffic inside DNS packets (or pings for the icmptx method), which are generally allowed to pass through firewalls and content filters. Basically, it is detectable if your network administrator is looking in the right place and knows his stuff. There would either look like a constant stream of DNS requests from a particular IP on the school network, or a constrant stream of ICMP traffic (pings) being sent out. However both ICMP and DNS are normal for any network, so its also equally possible that the administrator never notices that anything is wrong at all...
Some more sophisticated networks may employ transparent DNS or transparent proxy, which would make these efforts much harder. Transparent proxy is able to intercept any traffic and force it through the proxy at school, while transparent DNS is able to intercept DNS traffic and force it to use a specific DNS server regardless of settings on your tablet.
Like I said in the beginning though, these are really advanced networking tricks that certainly aren't easy to set up, even when all the components are readily available.. its possible they haven't even been attempted yet on an Android device. That said, it shouldn't be difficult to port either icmptx or nstx over to Android for somebody with the requisite programming skills.

[APP] Clockworkmod Tether (Alpha)

Koush, they guy behind Clockworkmod has come up with another little gem you might want to try. It is a tether app that bypasses most carrier restrictions and allows easy data tethering of your phone to your PC/Mac/Linux computer. Another little plus: It does NOT require root!
Below is his post on Google+ where you can download the relevant client, and it pushes the APK over to your phone. (Make sure USB debugging is enabled.) It is still in Alpha so may not work for everyone, but we know from his previous work that all kinks will eventually be ironed out.
https://plus.google.com/103583939320326217147/posts/1Yy1jb9z4TA
suggest spoofing your browser's user agent
Serious bump to this post. I've got eight days left on the free trial and intend to throw down the five bucks once it asks, no question. Thanks Koushik and anyone else involved, and thanks wnp_79 for calling some XDA attention to this. I'd be interested in knowing how it works it greater detail. Here's the google play link: https://play.google.com/store/apps/details?id=com.koushikdutta.tether
This is a godsend as I'm in a situation where I suddenly need to tether a lot and my T-Mobile USA plan is, or at least the lady claimed, super unlimited, no cap whatsoever and no throttling. Hard to believe, and I'm in LTE areas. The only asterisk is that I pay extra if I want to tether, and there is a limit on tethering, no unlimited, and I don't know if they're looking for tethering or if they're focusing on their bigger problems. Even works on Linux, even lets me do other things like ssh. But one thing this app and its proxy magic do not do is change your browser's user agent string. That leaves you vulnerable to carrier detection based on what browser you're using.
So, to be a little extra safe in case your carrier is sniffing for that, if you're going to be doing this a lot and going heavy on the data, perhaps change (spoof) your computer's browser's user agent (how it identifies itself to servers) from its default to a mobile device, ideally identical to what you use on your phone. To do this without installing anything onto your browser, check this guide, http://www.howtogeek.com/113439/how...user-agent-without-installing-any-extensions/. For example this can be done easily in Firefox's about:config.
Or, use extensions/addons.. For Chrome, User-Agent Switcher for Chrome (https://chrome.google.com/webstore/detail/user-agent-switcher-for-c/djflhoibgkdhkhhcedjiklpkjnoahfmg) works. For Firefox, User Agent Switcher (https://addons.mozilla.org/en-US/firefox/addon/user-agent-switcher/). I've used both, they work (watched my own server logs to be sure) and seem legit. Downside is that you'll be seeing some mobile-formatted sites but hey, possibly-safer scofflaw tethering.

How to get around tethering detection

As you all know most US (and i believe other) carriers try to charge us more for the data we already pay for if we want to use it in any method besides from our phone. There are a lot of apps that claim to get around it and it works for some and not for others, after some extensive google-fu and research i have found out that most if not all carriers use one of two methods of detecting tethering. 1.if the built in tethering is used the phone will use a separate tether specific apn 2.they look at the TTL of a packet, if tethering is being used the TTL will last past the WAN of the phone.
So i set out to try and find a way around this and a method of tethering that would work safely for all and get around TTL detection and i believe i have now found it.
Things you will need:
-Root
-ConnectBot
-ProxyDroid
-PDAnet (or any other tethering app)
-Something to SSH into
I will post more detailed instructions with screenshots and such if anyone wants but for now ill just keep it simple. Make sure your phone is on 3/4G. Open ConnectBot and connect to your ssh server, bring up the options menu and select port forwarding. Setup a dynamic (socks) proxy on port 8080 (or w/e you feel like) now open proxydroid and set host to 127.0.0.1 and make sure to enable global proxy (this does not work on all phones if it does not work for you then there is not much you can do) now open up a browser and go to any of the various ip checking sites and make sure your ip is showing up as the ssh servers ip and not a mobile one. Now enable pda net and do the same from the tethered device. If the ip is showing up as the remote servers then congratulations you are now tethering and they cant see the packets going to anything but the phone because everything is contained within the SSH session. Meaning the TTL on packets will end at the phones WAN as they expect them to.
I have been doing this on AT&T for some time now (around a month) and so far they have not found out and all is well, hope this helps at least a few people good luck!
Thwnks
Sent from my SCH-I500 using Tapatalk 2
I will test this out to see if it works for me. Thank you so much.
Well jesus you Americans really need a lesson in freedom
Sent from my GT-I9000 using xda premium
Hey, as long as we have our Freedom Fries, we're happy.
And fat.
I tried following you instructions, but when I try to visit a website no connection is available. What ssh server are you using. Have any idea where I may have gone wrong?
Thanks
Has anyone been able to get this working. Whenever I select "Global Proxy" in ProxyDroid, I get no data. I changed the host to 127.0.0.1, but should I leave the port to default 3128 and Proxy Type to HTTP? Is there any other changes I should make in ProxyDroid? Thanks
china99boy said:
I tried following you instructions, but when I try to visit a website no connection is available. What ssh server are you using. Have any idea where I may have gone wrong?
Thanks
Click to expand...
Click to collapse
Make sure you set the user agent on your computer browser to mobile. Had to do tethering for a client few days ago, and that was the problem. For Firefox and Chrome there are plugins for it.
Thanks for your response....I haven't gotten to the PC as yet. I am don't get any internet connection when I enabled ProxyDroid in with Global Proxy checked. And the OP said to make sure it is selected. So this is where I am stuck. Not sure whether I need to do any other configuration in regards to ProxyDroid. But thanks for your help.

Adfoc. Us spam

Hi guys, i recently got this adfoc.us popup or somethig and it shows on 99% of the webpages when i browse the web via chrome. Its probably a malware or something but I cant get rid of it. It also prompted me if i want to inspall sexy cafe. Apk or something.
Anyone has same problem and how can i get rid of it? Should i do factory reset?
Thanks
raperot said:
Hi guys, i recently got this adfoc.us popup or somethig and it shows on 99% of the webpages when i browse the web via chrome. Its probably a malware or something but I cant get rid of it. It also prompted me if i want to inspall sexy cafe. Apk or something.
Anyone has same problem and how can i get rid of it? Should i do factory reset?
Thanks
Click to expand...
Click to collapse
You could try downloading an AV program off of Google Play Store, but you may have to factory reset.
You are not infected, but your router is. DNS is changed, go into router settings and put manual DNS from Google
Sent from my Nexus 5 using Tapatalk
Highly doubt its the router (unless remote admin is turned on, then you deserve it) sounds like hosts to me
I don't use windows, but this should help
http://blog.mitechmate.com/remove-adfocus-us/
then use this for your windows machine and phone
https://www.malwarebytes.org/ and http://www.labtechsoftware.com/hitman.php
make sure you use them in safe-mode, or use a live linux cd and clean the mess up
Sent from my rooted RCT6203W46 using xda-dev app
I work in a isp company and yes it's a router. zte and tplink routers have more or less widely open wan access, either from web, cwmp or SNMP, so merely changing web access pass does not help some script kiddie plays with range of IP addresses and you have adfoc site on every computer, phone, etc
Sent from my Nexus 5 using Tapatalk
absbrain said:
I work in a isp company and yes it's a router. zte and tplink routers have more or less widely open wan access, either from web, cwmp or SNMP, so merely changing web access pass does not help some script kiddie plays with range of IP addresses and you have adfoc site on every computer, phone, etc
Sent from my Nexus 5 using Tapatalk
Click to expand...
Click to collapse
What does working for a isp company have to do with anything ?
adfoc.us is nothing more than 'bundling' malware not a virus (to be technical a redirect virus) that highjacks DNS and hosts files on windows machines also adds other malware hence it's called 'bundling'.
Its real name is adfocus.us browser hijacker, it's distributed by hook
A Hook is programmed as DLL file that it is capable to block the message of solicitation to a desirable site and achieve redirection, then a cyber criminals may use Windows Socket Layer Service Provider associated with SPI to get user’s transmitting data no matter you are using Firefox, IE or Chrome
If you have a "wide open" type of router, you shouldn't be using a computer or phone period
Been removing rootkits, virus, malware off of windows machines for many years, don't need a isp worker to tell me it's a router
Well, ISP worker tells you, from first hand experience that some Chinese routers can be manipulated regardless of web password and DNS can be changed.
That means ISP worker has seen DNS changed from our DNS to some address in Germany. And wide open router is something most users know nothing about especially regarding cwmp protocol.
And we have reports from our customers that every network device opens adfoc.us it's not really rocket science is it ? And windows is crap we get that but I'm somewhat sure my version is the correct one, especially because adfoc.us tried to install some apk file (see original post) Not sure if apk files work with windows
Sent from my Nexus 5 using Tapatalk
Thx for your replies gents. I dont think this adfoc. Us crap pops up when i use my pc, only on my mobile and also when i use mobile data.
absbrain said:
Well, ISP worker tells you, from first hand experience that some Chinese routers can be manipulated regardless of web password and DNS can be changed.
That means ISP worker has seen DNS changed from our DNS to some address in Germany. And wide open router is something most users know nothing about especially regarding cwmp protocol.
And we have reports from our customers that every network device opens adfoc.us it's not really rocket science is it ? And windows is crap we get that but I'm somewhat sure my version is the correct one, especially because adfoc.us tried to install some apk file (see original post) Not sure if apk files work with windows
Sent from my Nexus 5 using Tapatalk
Click to expand...
Click to collapse
Can you give me some links that actually prove that this malware takes over/changes router settings ?
Were not talking windows tcp protocols and hosts, but, actual router settings
Sent from my rooted RCT6203W46 using xda-dev app
piperx said:
Can you give me some links that actually prove that this malware takes over/changes router settings ?
Were not talking windows tcp protocols and hosts, but, actual router settings
Sent from my rooted RCT6203W46 using xda-dev app
Click to expand...
Click to collapse
Not really sure why are you so opposed to idea that ultra-cheap (10-15 euro) router can be hacked ?
http://www.csoonline.com/article/21...e-routers-to-attack-online-banking-users.html
http://rootatnasro.wordpress.com/20...-from-the-zynos-rom-0-attack-full-disclosure/
And I'm talking exactly about this (ZTE, and TPLINK). And you must know that almost all xDSL routers given to customers by large(r) ISPs have custom firmwares (because of ACS configurations, port mapping, etc) so the potential for unintended WAN access is huge. And the ISPs always will buy the cheapest and fastest available router, so it's not surprising at all.
raperot said:
Thx for your replies gents. I dont think this adfoc. Us crap pops up when i use my pc, only on my mobile and also when i use mobile data.
Click to expand...
Click to collapse
Yeesh. Try safe mode?
Sent from my Nexus 5 using XDA Free mobile app
MrObvious said:
Yeesh. Try safe mode?
Sent from my Nexus 5 using XDA Free mobile app
Click to expand...
Click to collapse
I tried surfing in safe mode on another wifi network at my office. I dont have any problem at all.
Not once this adfoc popped up.
It must be some third party app or the rooter as absbrain mentioned. If its the rooter I should have the same issue on my pc as well correct?
absbrain said:
Not really sure why are you so opposed to idea that ultra-cheap (10-15 euro) router can be hacked ?
http://www.csoonline.com/article/21...e-routers-to-attack-online-banking-users.html
http://rootatnasro.wordpress.com/20...-from-the-zynos-rom-0-attack-full-disclosure/
And I'm talking exactly about this (ZTE, and TPLINK). And you must know that almost all xDSL routers given to customers by large(r) ISPs have custom firmwares (because of ACS configurations, port mapping, etc) so the potential for unintended WAN access is huge. And the ISPs always will buy the cheapest and fastest available router, so it's not surprising at all.
Click to expand...
Click to collapse
I am not opposed to the idea, its not new, but, first of all, this article is just about a year old, and new firmware has been out since then, have the users switched to the new firmware, who knows, 98% of windows people are point & click, that is the biggest problem, especially using android.
Second, like I said earlier, and what the article says also, remote admin should be disabled and change the default username and password, here in the states, dsl kinda faded out 10 years ago and those routers you list aren't common here, not saying this can't happen, but, OTOH a little common sense goes a long way.
Javascript is a popular way to get infected from websites, running things as noscript, ghost, etc, should help out a lot, there is a lot you can do to prevent this stuff from happening, most people are clueless or lazy or click happy.
Another way to help is to get rid of windows (every operating system can be hacked) (flame) but others are more secure by design, or for banking needs use a live linux cd/usb stick, 99% of people won't bother or even research the idea.
I look at this as pebak, and not knowing enough of the internet or their equipment and just clicking on anything, hence the point & click.
I run a few servers, none are windows, we do have windows clients. I try my best
Sent from my rooted RCT6203W46 using xda-dev app
raperot said:
I tried surfing in safe mode on another wifi network at my office. I dont have any problem at all.
Not once this adfoc popped up.
It must be some third party app or the rooter as absbrain mentioned. If its the rooter I should have the same issue on my pc as well correct?
Click to expand...
Click to collapse
Possibly. Unless it is Android only malware or affects your computer differently. If you have any lesser known apps installed try removing them. I would honestly suggest a factory reset.
Sent from my Nexus 5 using XDA Free mobile app
absbrain said:
You are not infected, but your router is. DNS is changed, go into router settings and put manual DNS from Google
Sent from my Nexus 5 using Tapatalk
Click to expand...
Click to collapse
Hi,
Its definetely the wi-fi rooter that i have w hich is TP Link.
I called my proveder they said there is a problem with the DNS. They reset my rooter online and it was fine for couple of days.
But now same thing happens. On both my wife and mine mobile phones surfing is impossible.
It automatically swithches the link to a porn site. Same thing happens as a pop up on my PC as well.
Any solution to fix this or I should get a more expensive rooter?
Thanks a lot.
raperot said:
Hi,
Its definetely the wi-fi rooter that i have w hich is TP Link.
I called my proveder they said there is a problem with the DNS. They reset my rooter online and it was fine for couple of days.
But now same thing happens. On both my wife and mine mobile phones surfing is impossible.
It automatically swithches the link to a porn site. Same thing happens as a pop up on my PC as well.
Any solution to fix this or I should get a more expensive rooter?
Thanks a lot.
Click to expand...
Click to collapse
Sounds like your router may have been compromised. Try a complete reset of it including updating it's firmware.
Sent from my Nexus 9 using XDA Free mobile app
jd1639 said:
Sounds like your router may have been compromised. Try a complete reset of it including updating it's firmware.
Sent from my Nexus 9 using XDA Free mobile app
Click to expand...
Click to collapse
Tried that, same thing happens.
I'm being directed to spaces.slimspots.com and then to various porn sites.
Its really annoying and I cant seem to find a solution.
raperot said:
Tried that, same thing happens.
I'm being directed to spaces.slimspots.com and then to various porn sites.
Its really annoying and I cant seem to find a solution.
Click to expand...
Click to collapse
Have you tried malwarebytes on your pc's?
Sent from my Nexus 5 using XDA Free mobile app
I would recommend the following:
1) Hard reset all your devices. Back up your data but then completely wipe the phone (/sdcard as well).
2) Disconnect your PCs. If you are savvy enough I would recommend running a Linux distro for a few days (so you can at least still use the computer).
3) Get a CD (not usb stick due to writableness) and download several AV tools (quick Google will yield some results). Take the PC offline (unplug ethernet/disable wifi), put the CD in, run a few scans and get it cleaned out.
4) Manually take your router and disable DHCP/DNS interally, forward your DHCP requests if you decide to keep DHCP on to a known good DNS server like 8.8.8.8.
5) Ideally, swap the router out for a new one or use your own instead of #4.
Something is causing it.
MrObvious said:
I would recommend the following:
1) Hard reset all your devices. Back up your data but then completely wipe the phone (/sdcard as well).
2) Disconnect your PCs. If you are savvy enough I would recommend running a Linux distro for a few days (so you can at least still use the computer).
3) Get a CD (not usb stick due to writableness) and download several AV tools (quick Google will yield some results). Take the PC offline (unplug ethernet/disable wifi), put the CD in, run a few scans and get it cleaned out.
4) Manually take your router and disable DHCP/DNS interally, forward your DHCP requests if you decide to keep DHCP on to a known good DNS server like 8.8.8.8.
5) Ideally, swap the router out for a new one or use your own instead of #4.
Something is causing it.
Click to expand...
Click to collapse
Great advise, especially #5 (you can also use linux box as a router)
Sent from my rooted RCT6203W46 using xda-dev app

Setup an Android ad block vpn on my home server? (As an alternative to blokada/adblock plus)

Is it possible to setup an ad blocker as part of my personal vpn server? I'm unsure of exactly how ad blocker vpns work (such as ad block plus/blokada), but I'm a little hesitant/untrusting of having this vpn connection always on and running all of my traffic through it.
What would I need to do set this up myself? Alternatively, maybe someone could explain what exactly I'm exposing by having [blokada] enabled all of the time?
Thank you
EvanVanVan said:
Is it possible to setup an ad blocker as part of my personal vpn server? I'm unsure of exactly how ad blocker vpns work (such as ad block plus/blokada), but I'm a little hesitant/untrusting of having this vpn connection always on and running all of my traffic through it.
What would I need to do set this up myself? Alternatively, maybe someone could explain what exactly I'm exposing by having [blokada] enabled all of the time?
Thank you
Click to expand...
Click to collapse
I'm kinda confused by your question in the first part. On what hardware do you intend to do the blocking? on your android device or on a remote/local server? if you intend to do that on android, then here are some things to consider:
There is the Root method, which I assume based on your question you don't want.
Then there is the rootless method, which is basically an exploit of a loophole in how android handles VPNs. Apps like Blokada and such supposedly establish a VPS locally and block DNS blacklisted requests by leveraging the VPN permission. you can use different apps to monitor them and see what goes out, but you most likely won't find anything suspect.
If you're that paranoid, I suggest using the web server feature in the Adaway app, which lets you use your own host list/DNS block list, sign it yourself for your phone to Trust (as trusted agent or CA certificate) and apply. Ofc doing it with adaway takes away (literally) the convenience of a self updated list, so you have to find your own lists and update it regularly for maximum block-ness.
Slim K said:
I'm kinda confused by your question in the first part. On what hardware do you intend to do the blocking? on your android device or on a remote/local server? if you intend to do that on android, then here are some things to consider:
There is the Root method, which I assume based on your question you don't want.
Then there is the rootless method, which is basically an exploit of a loophole in how android handles VPNs. Apps like Blokada and such supposedly establish a VPS locally and block DNS blacklisted requests by leveraging the VPN permission. you can use different apps to monitor them and see what goes out, but you most likely won't find anything suspect.
Click to expand...
Click to collapse
Thank you, that is super helpful information on how ad blockers work on non-rooted devices. I am not rooted (after Google started automatically updating Pixels I decided the hassle of manually flashing updates and the loss of Android Pay (at the time) wasn't worth it).
I have a Wireguard VPN server on a FreeNAS server at my house. I'm not sure what blokada can track and/or conceivably redirect my traffic using their own DNS server (?). If I can set up a "VPS" and DNS blocking using publicly available lists through my own VPN or a FreeNAS jail/port or my router, I'd prefer to do that.
Maybe I'm overthinking this though haha...
Thanks
EvanVanVan said:
Thank you, that is super helpful information on how ad blockers work on non-rooted devices. I am not rooted (after Google started automatically updating Pixels I decided the hassle of manually flashing updates and the loss of Android Pay (at the time) wasn't worth it).
I have a Wireguard VPN server on a FreeNAS server at my house. I'm not sure what blokada can track and/or conceivably redirect my traffic using their own DNS server (?). If I can set up a "VPS" and DNS blocking using publicly available lists through my own VPN or a FreeNAS jail/port or my router, I'd prefer to do that.
Maybe I'm overthinking this though haha...
Thanks
Click to expand...
Click to collapse
I can relate heavily on the google pay front, but I'm a power user through and through. not having total control freaks me out so root is a must for me, so i gave up using it.
Regarding the host/adblock setup, i do think you're overthinking it. A router with openwrt is basically 80% already pre-configured with dnscrypt and the tools necessary. Using FreeNAS jail, there are sooooo many tuts online for that, i won't even need to tell you how myself. Personally, I use a PI-hole in my home and wireguard/cha cha20 protocol on my router, the webserver feature from adaway on my phone and haven't seen an ad in almost 2 years now.
Slim K said:
I can relate heavily on the google pay front, but I'm a power user through and through. not having total control freaks me out so root is a must for me, so i gave up using it.
Regarding the host/adblock setup, i do think you're overthinking it. A router with openwrt is basically 80% already pre-configured with dnscrypt and the tools necessary. Using FreeNAS jail, there are sooooo many tuts online for that, i won't even need to tell you how myself. Personally, I use a PI-hole in my home and wireguard/cha cha20 protocol on my router, the webserver feature from adaway on my phone and haven't seen an ad in almost 2 years now.
Click to expand...
Click to collapse
Pi-Hole in a jail seems like it's exactly what I'm looking for. I'll look into getting that set up. Thank you!
EvanVanVan said:
Is it possible to setup an ad blocker as part of my personal vpn server? I'm unsure of exactly how ad blocker vpns work (such as ad block plus/blokada), but I'm a little hesitant/untrusting of having this vpn connection always on and running all of my traffic through it.
What would I need to do set this up myself? Alternatively, maybe someone could explain what exactly I'm exposing by having [blokada] enabled all of the time?
Thank you
Click to expand...
Click to collapse
All you need is to maintain the hosts file in Android's /system/etc.

Categories

Resources