« CCA client installation bypassAnd another outage »

New CCA bypass method

08/12/06

  21:20:00 by Joe, Categories: Resnet

Recently, Resnet installed a new version of CCA which does the Operating System detection quite differently than the old, brain-dead use of the User-Agent string.
I described some issues here.
I have now figured out when the detection is done in this version (a bit technical): The OS is determined during the SSL negotiation phase of the HTTPS login request.
I have a work-around for people who use my Perl script to log into CCA on Windows. I'll keep the exact work-around private for now, since I don't want Resnet personnel (who are known to read these pages) to dissect it already &#59;)
So, shoot me an email (jfeise at feise dot com) if you want it.

3 comments

Comment from: rob [Visitor]
rob

quick question on you windows perl script. do i upload the script somewhere? i am currently unaware of how to run the script. just wondering of where it needs to go

11/01/06 @ 08:27
Comment from: Joe [Member]

The script is more designed for Linux.
For Windows, you would have to install Perl first (e.g., from http://www.activeperl.com/ASPN/Perl). You then can run the script.

11/01/06 @ 09:57
Comment from: CCA [Visitor]  
CCA

You can find a program that can bypass any cisco clean access at this website http://ccabypass.googlepages.com/

02/25/08 @ 11:28


Form is loading...

This blog tries to capture all the gripes about UCI Resident Networking (Resnet) and the switch to UCI-managed Cable TV in on-campus housing.
This site is not affiliated with UCI or UCI Housing.
November 2024
Mon Tue Wed Thu Fri Sat Sun
        1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30  
 << <   > >>

Search

  XML Feeds

powered by b2evolution free blog software