Hack Router Port 53 Tcp

 admin  
Hack Router Port 53 Tcp Rating: 3,8/5 5951 votes

scenario of wifi : i'm using wifi in hostel which having cyberoam firewall and all the computer which uses that access point. that access point have following configuration

TCP/UDP Port 53 Common Use. DNS Service is typically used to convert between URL's and IP Addresses. Inbound Scan. If you are running a DNS server and have forwarded port 53 on your firewall then you need to setup a port forward within Link Logger such that future inbound traffic on this port will be logged as normal and not as an alert. If we use, say, port 4444 as the LPORT in our reverese_tcp payload, and then tell our router to direct anything trying to connect to port 4444 from outside the network to our kali machine, then we can receive the connection.

Tcp Ip Ports List

here, when i try to open a website the cyberoam firewall redirects the page to a login page (with correct login information, we can browse internet else not), and also website access and bandwidth limitations.

once i've heard about pd-proxy which finds open port and tunnels through a port ( usually udp 53). using pd-proxy with UDP 53 port, i can browse internet without login, even bandwidth limit is bypassed !!!

and another software called openvpn with connecting openvpn server through udp port 53 i can browse internet without even login into the cyberoam.

both of softwares uses port 53, specially openvpn with port 53, now i've a VPS server in which i can install openvpn server and connect through the VPS server to browse internet.

i know why that is happening because with pinging on some website(eb. google.com) it returns it's ip address that means it allows dns queries without login.

but the problem is there is already DNS service is running on the VPS server on port 53. and i can only use 53 port to bypass the limitations as i think. and i can not run openvpn service on my VPS server on port 53.

so how to scan the wifi for vulnerable ports like 53 so that i can figure out the magic port and start a openvpn service on VPS on the same port. ( i want to scan similar vulnerable ports like 53 on cyberoam in which the traffic can be tunneled, not want to scan services running on ports).

improvement of the question with retags and edits are always welcomed..

Another Question

i'ave made simple client server application in which a external computer acts as server running on UDP port 53 and client running inside the wifi; will connnect to that out side server that is running on UDP port 53. problem is it can't connect that server application.what should be the reason, why client inside wifi can't connect outside server running on UDP port 53 ?

NOTE : all these are for Educational purpose only, i'm curious about network related knowledge...

user181216
user181216user181216

2 Answers

Hack Router Port 53 Tcp

To identify the magic port, you can use nmap while inside the wifi network, and scan the IP address of your VPS for all UDP and TCP ports:

Gravely pro chip 12108. Jul 6, 2018 - Download Atmel Prochip Designer best software for Windows. Graphics synthesis and simulation tools Atmel Pro Chip Designer Sayantan. ProChip Designer. A full-featured EDA suite with state-of-the-art, Mentor Graphics synthesis and simulation tools integrated into a user-friendly design. Jan 27, 2018 - Atmel Pro Chip Designer Sayantan. Turkish March, Rondo Alla Turca, Mozart: free classical PDF piano sheet music to print. In reality currency. Atmel Prochip Designer herunterladen Fullfeatured EDA suite with stateoftheart. Graphics synthesis and simulation tools Atmel Pro Chip Designer Sayantan.

The idea here is that the firewall at the wifi end is blocking packets leaving the local network, but any that get through, must be via open ports. So on the VPS side, you run

You will need to work out the public address by going to http://whatismyip.com

We are not interested in the results that nmap comes back with, we want to see what tcpdump sees - any packet that makes it to the VPS will have passed through the firewall, so the destination port of the packet will tell us which ports are open:

The above fragment shows that a packet arrived on the ssh port, which is 22, which must be permitted through the firewall.

Tcp Port 23

Note that while you are able to do DNS queries, it does not follow that port 53 is open to the internet. The usual case is that you are permitted contact to controlled DNS servers, and it is those that can forward DNS requests out to the internet - much like in a domestic setting you often set your router to be the DNS server for the network, and it is the router that resolves queries.

If it is the case that port 53 is open only to specific DNS server, then you can get around it using an IP over DNS tunnel. If you have a VPS running a DNS server and you have a domain name you can can control, you could use iodine which allows you to tunnel IP over DNS queries, and so removes the need for OpenVPN (though running OpenVPN inside the tunnel will ensure your packets are protected. You could also do the same with ssh).

PaulPaul

Tcp 53 Vs Udp 53

ZiyaadZiyaad
Hack Router Port 53 Tcp

Not the answer you're looking for? Browse other questions tagged networkingwireless-networkingvpnfirewallbypass or ask your own question.

   Coments are closed