/UDP53-Filter-Type

A script to detect your hotspot's interception/filter of packet via UDP53.

Primary LanguagePythonMIT LicenseMIT

What's this?

This Python script is aimed to test your hotspot's interception/filter of UDP 53. Besides, DHCP(67/68) is also a good option.

v2

Recommend to use udp53v2.py, python 3.6 or above only.

Custom usage of v2: python3 udp53v2.py -s=114.3.5.2 -p=553

What's the purpose?

The good news is, if your hotspot DOES NOT filter any kind of UDP 53 Packet, you may want to setup an OpenVPN server with UDP 53 in order to bypass Web Auth so you could surf the internet without paying fees. Sometimes under some rare conditions the test just went wrong, so you may wanna test it a few times to make it more accurate.

What's that IP Address?

That IP is my server to perform the response. It's a sad news I haven't found a public server that could meet my needs(check THEORY.MD for more info). By the way, this server is about to close(in a few months). I'm looking for alternatives.

Quick Start

If you have Python

git clone https://github.com/BennyThink/UDP53-Filter-Type
cd UDP53-Filter-Type
python UDP53.py

If not...

(For Windows user only) Download from release. By then you'll see an udp.exe. Double-click it!

If you have Python...Option 2

Fire up a terminal, type python and enter:

import socket
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect(('123.206.87.223', 53))

If you see complains about connection refuse, then try OpenVPN.

My test passed, how can I bypass Web Auth?

Just simply setup an OpenVPN server with UDP Port 53. If you are newbie to this, simply click me for more info.

I want to build exe file by myself.

Ok, install Python and corresponding version of pyinstaller. Then run build_exe.cmd, you would get an single exe file.

Environment

Windows/Linux with Python 2.7 test passed. Also support Python 3.6

See Also

error code

theory

License

Published under MIT License.