How to bypass plane WIFI limitations ?

Mateleo@lemmy.dbzer0.com to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com – 72 points –

Hi everyone, I was wandering how to bypass plane limitation on WiFi. Companies are offering free WiFi limited to SMS and WhatsApp. Is there anything available to have a complete internet access without paying their 30$ option ?

I tested VPN but no connections seems possible.

21

I wouldn't fuck with anything related to flying tbh, since that shit is pretty closely monitored for anything sus.

I remember seeing some chatter about tunneling over XMPP. Most plane wifi allows chat protocols, and it should be possible to encapsulate your traffic as ascii text in XMPP packets. You "just" need to set up the endpoints to do the bridging.

Of I were to do it, I'd run a a script that sets up a tun/tap interface that everything else on my laptop will communicate through. This script also connects to my xmpp server at home. Any data coming in on the tun/tap is encoded to ascii strings and sent as chat messages to my xmpp server. The same script can also do the reverse. At home a similar script does, mirroring that on my laptop. Make sure prerouting is set up accordingly in both ends.

From what I've seen on planes, it's mostly down to captive portals using mac addresses to track clients. In theory it should also be able to sneak through by spoofing hardware addresses of someone who's paid for the service.

I only understood about half of that, but it seems like this would result in very high ping and very low bandwidth.

Hop on a plane between a major city and Las Vegas a couple days before DEFCON and I'm sure someone will know

I'd want to look into where the limitation is.

  • If it's with DNS, you can just set your local resolver to 1.1.1.1 (Cloudflare)
  • If it's on the port, then you can try tunnelling traffic over port 443 to somewhere that simply relays your traffic onward, like a personal server running SSH on port 443.
  • If it's on the IP, blocking access to any IPs not in a whitelist of known WhatsApp IPs, you may be SOL.

They use MAC address filtering I believe.

Mac filtering aint doing shit in this case.
Either it's open or not with MAC filtering.

This is more likely protocol, port and IP/DNS based blocking.

You can run an arp-scan to check and see if there are any devices on the network that could be whitelisted and spoof their MAC

First, you find out how they whitelist whatsapp. Is it IP address? SNI? Restricted DNS?

Of course your seat neighbor is going to see you using hacking tools, call the FA and you'll be arrested when you land.