How to break through the limitation of LAN

Question 1: How to break the restriction of LAN and modify the MAC address of network card?

We all know that some companies, schools and so on will manage the network in a unified way. One of the most important unified management is to bind the IP address according to the physical address of the network card. If you surf the Internet in the company, download BT, surf the Internet through QQ, etc. In violation of regulations, the network administrator can block your IP address according to the address of your registered network card.

To solve the problem of IP being blocked is to modify the network card address. There are many ways to modify the MAC address of the network card:

First, direct modification.

Open the network connection, and right-click the "Local Area Connection" PC icon to open the "Properties".

Click the configuration in the above figure, select the "network address" in the following figure, and then enter 12 hexadecimal digits in the "value" on the right (note that every bit of the mac address from 0 to f is legal, such as 00-50-8d-11-2f-9b, the first three bytes.

Second, modify the registry.

If the network card does not support direct modification, it can be done through the registry.

1, set the control class {4d36e972-e325-1ce-BFC1-08002be10365438} in the current control of HKEY _ local _ machine system, and then you will see 000000/.

2. Under it, add a string named NetworkAddress and set its value to the desired MAC address (note that the address is still written continuously). Such as: 00E0DDE0E0E0.

3. Then add a primary key named NetworkAddress to the Ndiparams below it, and add a string named default under this primary key, whose value is the MAC address you want to set, and you should write it continuously, for example, 00000000000. (In fact, this is just the "initial value" set in the advanced attribute mentioned later. The actual MAC address still depends on the NetworkAddress parameter mentioned in point 2. Once this parameter is set, the value in the advanced properties will be the value given by NetworkAddress, not the default value. )

4. Continue to add a string named ParamDesc under the primary key of NetworkAddress to specify the description of the primary key of NetworkAddress, and its value can be named by itself, such as "NetworkAddress", so that the network address option will appear in the advanced properties of the network card, that is, the new network address you just added in the registry, and you only need to modify the MAC address here in the future. Continue to add a string named Optional, and its value is set to "1", so that when you select the network address item in the advanced properties of the network card in the future, the "non-existent" option will appear on the right.

5. Restart the computer, open the properties of online neighbors, double-click the corresponding network card item, and find an advanced setting item of network address, which can be used to directly modify the MAC address or restore the original address.

Question 2: How to break through the restriction of intranet? The proportion of internal network and public network is indeed limited, and it can be solved by using peanut shells as port mapping. There are many specific methods on Baidu, and the mapping information can be filled in as follows:

Question 3: How to break the restriction of the company's local area network and realize 100 minutes online? Your company may have a double binding of online MAC address and IP address, that is, it has been set up in the router, which limits the operation authority of the specified MAC and IP. If the company's router is very powerful, you can restrict all ports, IP, MAC, etc. There is no way out. If you move, you will be restricted.

For an ordinary router like TP-LINK, you can change the MAC address of the computer. In the network card properties of the device manager, right click, and there is a software that can change the MAC address of the network card. You can automatically generate MAC addresses online and modify them yourself, so you can generally jump out of the router's restrictions. Then modify the IP address to see what the IP address of your unlimited colleagues is like. Just change it almost.

This is because routers generally have some spare IP addresses, which are unlimited and can be used by managers or special situations. You can take advantage of this loophole.

Question 4: What software can be used to break through the restriction of video in LAN?

Question 5: How can a LAN break through the limit of the number of login accounts with the same IP? This * * * guardian is installed on FWQ, right? Then when you surf the Internet at home, it's actually another computer calling the program in this computer (I don't know if you understand what I said), so when you play games, the IP address displayed is one, which is actually from 1 computer. It can't be two IP addresses! ! I haven't thought of the software scheme. The hardware scheme is to get a router, which will automatically create an IP address according to the number of your computers and automatically allocate bandwidth! Look at it!

Question 6: How can I break the company's local area network restrictions? First, determine what methods companies use to restrict IP. If it is hardware control, it is very troublesome to crack.

First, how to judge whether it is hardware-controlled Internet access?

1. First, let's look at the number of gateways that can access the Internet. For example,192.168.0.1-255 can surf the internet, but192.1-255. Different network segments are different, indicating that it may be hardware protection technology.

2. Make sure to change your IP to 0 code segment again. When working overtime, try to plug the computer into a computer socket with Internet access. If you can get online, I'm sorry, but I tell you, it must be hardware protection.

Hardware protection is that the network management uses two hosts, and the two switches drive two different gateways of the company respectively; One of the two hosts can be connected and the other can't, and then the two hosts are bridged by a network technology to realize the data transmission function of different gateways. In this case, Flying Pigeon Book, a LAN file transfer software, can also realize file transfer between different gateways.

Second, the cracking method:

A: Under the condition of hardware limitation, there are two ways to surf the Internet:

1, buy a small four * * * to change the phone, divide it into four parts on the interface that can access the Internet, connect another line by yourself and change the IP.

2. Use a remote desktop connection in the program-attachment-communication, receive a computer with Internet access, and borrow chickens to lay eggs, but only if you know someone else's user name and password. Also let the other party turn on the remote function. The remote function is marked in "My Computer-Right Click-Properties-Remote-Allow other computers to connect to this computer remotely". This method is a bit complicated. You need to change the registration form and open two accounts for the other party's phone, one for others and one for yourself. Otherwise, an account that doesn't change the registration form is easy to be found by others, because as soon as you get online, other people's mobile phones will be automatically locked. (The specific modification method is easy to find by online search. However, it is difficult for you to open two accounts to modify someone else's registry unless you have a good relationship with him. If it is good, I suggest you use the first method. That won't affect the network speed of both parties.

The method of breaking the limitation of software.

1, first know someone else's MAC address, and you can know it by typing IPCONFIG /ALL, such as 00-25-2B-6C-45 (this is just an example). It's easy to know a MAC with Internet access.

2. Change the MAC address to be the same as him. You can also modify the registry, or use the super rabbit. If you are a novice, using a super rabbit is relatively simple.

3. After the change, it depends on whether the IP gateway that can access the Internet is the same, that is, 0 or 1 or something else. If it's not the same, remember to change it to the same one. The last data 1-255 doesn't matter as long as it doesn't conflict with others.

4. If there is any conflict, please use the software Antiarp. It is green, like a satellite receiver. It's easy to find this little software on the Internet. Open it, and then check MAC conflict prevention. This will not be afraid of network card conflicts.

According to what I said above, you can enjoy it secretly when you are finished. It's over.

Question 7: How to break through the company's computer access restrictions? No, you need the ip and password set by the network administrator to log on to the Internet, or wait for the network administrator to lift the restrictions, and even if you break the password and invade the network, the network administrator can find you, so it's best not to think about it. . .

Question 8: How to break through the LAN IP blockade of 1 and use ordinary HTTP or SOCKS? You can directly search for HTTP proxy on the website, and then add it to IE, so you can easily access the destination website.

2. The IP address of the server port of some online games related to the protocol is limited, or FTP and TELNET are not available. To solve this problem, you can use the SOCKS proxy to add the software to Sockscap32 for access.

3, related to packet filtering, such as filtering through proxy servers or hardware firewalls, or prohibiting some key characters, such restrictions are relatively strong. Mainly like blocking MSN through ISA Server 2006 and filtering data packets, ordinary agents can't break through. In order to break through this relatively advanced restriction, we need to use encryption proxy here, that is to say, the data streams of HTTP or SOCKS proxy in the middle are all encrypted, such as springboard, SSSO, FLAT and so on. As long as the proxy is encrypted, we can break through. With these softwares and Sockscap32, this limitation is basically broken.

4. First find the proxy of commonly used HTTP 80 port, cooperate with socks2, replace the HTTP proxy with socks proxy, and then cooperate with cksCap32, it is easy to break through.

5. There is a breakthrough method of proxy encryption in the middle, so that network administrators don't know what the data in the middle is. You can use FLAT-like software to cooperate with SocksCap32. Of course, it is best to be an 80-port FLAT proxy, because FLAT also supports access through an ordinary HTTP proxy, but it doesn't matter if it is not an 80-port.

You need to add an 80-port HTTP proxy. The proxy springboard is ok, but the proxy still needs 80 ports. If some restrictions are simple, you can also use some port conversion technologies to break through the restrictions.

Question 9: How to break through the limitation of LAN router? Whether we can break through the limitations of LAN routers depends on the limitations of operators. First, you can surf the Internet without connecting to the router, then click Start-Run -cmd to enter, enter the mac address of the ipconfig/all recording device, and log in to the router. Take tp-link TL-R478 as an example. After logging in successfully, select network parameters, then select mac address clone, and click Clone mac address.

When finished, check to see if it matches your computer's mac, and then try it.

Question 10: how to break through the limitation of company LAN? Network management has always been more beneficial than having a network management. If you break it today, he can seal it tomorrow.

Theoretically, you can't always be "at large" unless the webmaster lets you go on purpose. From your point of view, your network management is not setting a simple policy, not only IP and mac, but also binding on the port. This kind of situation, even if you break through, he will soon find out, and then?

Every day, I can see countless people on Baidu asking how to break through the restrictions of local area network. In fact, it is very simple, unless your technology is higher than that of network management. Of course, the equipment itself is no problem, even if there are loopholes that can be broken, it is considered to be caused. If your technology is equal to his, don't say it, let alone a student who has just started to learn technology. If an administrator can't restrict users, is it still called an administrator?