Advertisement
Guest User

How to Bypass MyCircle

a guest
Nov 17th, 2019
5,296
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.23 KB | None | 0 0
  1. ## HOW TO BYPASS MYCIRCLE ##
  2.  
  3. 1.) Scan the network first with Angry IP Scanner
  4. 2.) From the scanner results, pick a connected user. (Let's call this the target user).
  5. 3.) Turn off your Wifi to MyCircle receives no information about changes on your device.
  6. 4.) Change your MAC address to the target user's MAC address.
  7. 5.) Change your computer's network hostname to the target user's hostname.
  8. 6.) Reconnect to Wifi.
  9.  
  10. If you complete this correctly, you will have assumed the target user's network credentials. You now have unrestricted access to the Wifi network. MyCircle thinks you are the target user.
  11.  
  12. You can do this to any other user who is connected to the same Wifi-network. The other user's wifi will seemingly cease to work.
  13.  
  14. Caveats:
  15. - If you steal the MAC address and hostname of someone like your younger sibling, your will assume THEIR credentials, and you won't make any progress, since MyCircle limits your younger sibling as well.
  16.  
  17. - If you steal the credentials of another user, that user's wifi will seemingly cease to work. However, if that user reconnects to wifi (by turning wifi on and off), they will regain wifi access and override your access. This can result in a tug-of-war if 2 users with the same credentials repeatedly
  18.  
  19. - If you steal MyCircle's MAC and hostname, it will fight you for network access (see above). If you keep up the tug-of-war, eventually MyCircle can stop responding, in which case MyCircle administrators (your parents!) will find out that something is going wrong with the MyCircle device.
  20.  
  21. Recommendations:
  22. - Use the MAC and hostname of an internet-connected appliance, such as a refrigerator or printer. These devices intermittently connect to the internet and you can get near-complete Wifi freedom. However, if the device whose information you stole accesses the internet, it will override your information. This is a minor interruption, and if you wait just a couple minutes to be safe, the device can complete its small task and then you can resume unrestricted Wifi access.
  23.  
  24. - Never mismatch MAC address and hostname (e.g., use another user's MAC but your own hostname). This will allow MyCircle to link the MAC and hostname together in its user cache and could have unforeseen consequences.
  25.  
  26. ## CHEERS ##
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement