PDA

View Full Version : {|2eap} Proxies/ VPN's and User-Agents! Stay educated with the latest! {|2eap}



|2eap
05-03-2017, 10:32 PM
This is a prequel to "Guide to Transfering Your Purchased Goods v2.0" which is tba atm (still writing it)

My goal is to hopefully give you the knowledge and possibly open up a discussion about proxies, VPN's, user-agents, and everything in between. As we all know, JumpStart has been cracking down on hacking/ cheating. More so lately than before, well I have a few theories behind how this was done but we can discuss that another time.
Them doing so, has forced me to change my methods. -- Since they were so widely used. But another key area which I've noticed is causing problems is your actually your own doing (or the coders) just because these were not issues before.

Since I've started being more conscious about my proxies (and user-agent in code), ban rate is at 0% and I am able to accomplish A LOT more than I was before. Which is great news since my ban rate went from 0% to wtf, why is shit always getting randomly frozen. Hopefully this makes you excited, as this information is crucial!

Lets first start with explaining proxies and VPN's on a dumb'd down scale. This shit gets real complicated and very specific, but for Neopets, the general know how will satisfy.

Proxies & VPN's
I first want to note that I AM NOT a fan of free/ public proxies. Because you have to do some rigorous scraping and testing of the proxies to ensure your getting quality. Second, if we all use free proxies, from lets say HMA's public proxy list. Then won't there be many using the same proxy to do il-legit things? (seeing that they were tested and only x amount will be high anon and useful) And what i'm trying to stress to you is that JumpStart is not fucking around anymore, these things are logged and noted and will be used against you!
Third, they aren't dedicated, and may fail unexpectedly. And when free proxies fail, rather than keeping you offline, they just don't work and your real IP is exposed. Which leads me to a story where I almost lost all of my current stock at the time due to free proxies failing and exposing my IP on various accounts. After a few days (since its free and isn't dedicated) I had exposed myself and connected my home IP to all the accounts. Wake up the next day to find myself not only IP banned from Neopets but all my stock was GONE. I had to build from square one again and re-evaluate how much I really knew.

So now that I go that out of the way, you can imagine I wont be discussing free proxies. But the process is like this, you scrape proxies from the internet, you test the proxies, and you select only the best and hope they last (some websites out there offer a service like this for a small fee, but they give you a massive proxy pool).

Just keep in mind, it pays to.. well pay when it comes to proxies.



PROXIES
Proxies for idiots:P are basically a middleman between you and the internet. You connect to a different server and then surf the internet, or whatever application you have the proxy connected to, from that server. Since we use these for bots, all of the bots handling is done through the proxy. If you use it for your web browser only your web browser will funnel through this proxy. These are great for getting things done on multiple accounts at the same time under different identities. Most of the time you have to add an extension to the specific browser to get it to work for just that browser. Otherwise most browsers direct you to the OS internet options to route the traffic through there. But keep in mind, this does not mask all of your traffic, it just happens that browser uses your computers default internet settings. (But not all applications do, thus exposing your IP, kind of irrelevant though)
There are many types of proxy protocols and ways they are setup. You have [Only registered and activated users can see links] [Only registered and activated users can see links] and SOCKS proxies as the most popular. They can be setup as reverse backconnect, backconnect, reverse, transparent... you name it, they got it setup that way. This info is irrelevant unless your coding. But if you connect through sockets you'd want SOCKS proxies, so on so forth. Enough of that.


VPNS
VPN's masks your identity as well. However the key difference is a VPN masks ALL of your networks traffic. ANYTHING you do on your computer while connected to a VPN is masked. VPN is definitely the way to go if you are novice, but take this with a grain of salt, because your limited to really only one account at a time. Having to clear cache and cookies, change location and then re-login to Neopets on a new account. Basically you can't play or do things on multiple accounts (safely). If you only have one other account, or set of accounts (main and sides) then a VPN is the way to go, it will always ensure your traffic is encrypted for bots, skype, internet browsing etc.

User-Agents and OS's!

USER-AGENTS
This factor is over-looked because I don't think it was really ever a factor before. But like 95% of bots use the same user-agent. It's Chrome, and if not updated with the latest downloadable version, the user-agent shows up as an outdated version of chrome. Then, a cluster of people are using the same version of chrome from the same OS doing the same things. It's funny stuff.

To give you an idea of what I mean, check out this URL ([Only registered and activated users can see links]).
This url displays all the different User-Agent strings for just CHROME, albeit though some are really outdated versions but you get the gist. There are lots of options!

So why is this important? Well, how does it make sense if you were just access a website from Firefox on a Windows. To all the sudden doing tasks on Neopets from an outdated Chrome browser on iOS/windows? Or going from Safari on a iOS to Chrome on a Windows?

You get what i'm saying here?
Not to mention the user-agent could be of an outdated model which isn't a factor necessarily, unless its really outdated.

Example of headers sent.
This is Chrome for Windows 7 OS


Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.36

This is chrome for Mac OS


Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2227.1 Safari/537.36


It's different, it's not the same. And people generally update their browsers with newest releases. More so if its been a couple years (when you get a new computer you always download the latest) So anything older than like 2014 is probably not logical, could be safe, but doesn't really make much sense.

How can I fix this?
Well if your using an open-source bot, you can change it yourself. I don't want to scare completely, IT IS likely for people to have more than one browser, and a Mac/ Windows. It's when your switching it all around repeatedly and alternating between the two that it gets suspicious, when you start throwing in more OS's and user-agents, its just one big cluster-fuck of a mess. And yes, NEOPETS TRACKS THIS. They have a function called get_browser() which does exactly that. It gets your OS, and your browser and all the good stuff.

To recap, you need to be conscious of what browsers and operating system (and version of OS) you use for each account you access and keep it consistent.

Coders, i suggest the module fake-useragent, or something similar, or come up with a simple solution. [Only registered and activated users can see links] provides an API to get the latest for each browser and each OS. We should not overlook this.

Mix this in with Proxies and VPN's, if it doesn't add up correctly, its pretty easy to spot a bad fish when its swimming the opposite direction.

Even the option of choosing a Windows OS or Macintosh OS would be a huge difference.

Recommended Services

As for recommendations to Proxies or VPN's there are many to choose from with a variety of prices, all with a slight variation of how they do things. What you want to look for is people who have their own data-centers and are not reselling from someone else's servers. Why? For the best price obviously! And you haven't forgot have you? It pays to pay in the proxy world!
I've done some rigorous research recently on the subject and I've come across many providers that are suitable. To explain further, there are better services out there, apart from the go to's like HSS and HMA. Each of the latter use a cloud based system. Meaning nothing is dedicated and its split evenly among the users for load balance. Hints why you get slower load times, because you could have some asshole on the other side using up all the bandwidth. Oh and... WE ALL USE HMA AND HSS X_X

The downside to most VPN services, they are cloud based, there is no steady IP for a single location (Ex. HMA LA loc1 may have 10 different IP's for that one location), and it masks your entire computers network activity instead of the single instance/ browser you are working with.

On the contrary, private proxies do not mask your entire computers network and they can be pricey if your working in bulk. That's really about it, they don't limit you to one account but will mask whatever application your working with.



PROXIES
Newipnow.com ([Only registered and activated users can see links]) This service gives you the most proxys for your dollar. However, the IP's given are pretty similar in look. The locations are diverse, but it's still a little weird to me. I've used them before with no problems and were much faster than when using HMA. IP authentication available. [Only registered and activated users can see links] protocol
Get your proxies half off, just tell them some random google search phrase similar to proxies. ([Only registered and activated users can see links])
buyproxies.org ([Only registered and activated users can see links]) This place is great. They offer both semi-dedicated and dedicated proxies. The difference is the price and whom uses them. But nothing to sweat, they have their own data-centers so the speed is just as fast. Multiple subnets to choose from. IP authentication available. [Only registered and activated users can see links] protocol

squidproxies.com ([Only registered and activated users can see links]) Another great stop for private proxies. They offer both semi-dedicated and dedicated proxies. However their semi-dedicated proxies are only available in larger packages. The IP's are very diverse. A very professional service. IP authentication available. [Only registered and activated users can see links] protocol

bestproxyandvpn.com ([Only registered and activated users can see links]) These guys are top of the line. Not only do they offer dedicated IP's and have the best overall user experience. They also offer the most features, you can authenticate via user/pass, IP authentication. You can choose which protocol your proxies can handle, and the best part, you can change this whenever you want. switch from [Only registered and activated users can see links] to SOCKS in just a click of a button! They tell you where each location is located, the IP's are 100% unique from each other. They offer a free IP change and many other services, all with a few clicks of the button. I get a huge hard on by these guys because of how professional they are with their service. It's definitely my most recommended.



VPN
proxy-n-vpn.com ([Only registered and activated users can see links]) I really like these guys for both their pricing and the options they have available. You can choose from a shared VPN service or a dedicated, private VPN service. All for a really great price! They offer multiple subnets and locations for both the shared and private VPN experience.

bestproxyandvpn.com ([Only registered and activated users can see links]) They are amazing. All around amazing experience here. Not only do they offer private, shared, backconnect and everything in-between in terms of proxies, they also offer a top of the line VPN service. Their service is only private, meaning you are the only one on your VPN server. You can choose from multiple locations upon setup. Whats great about this is, the IP you receive will remain the same indefinitely until you decide to change it. Most other services refresh and repopulate proxy lists monthly.


Disclaimer: I'm no way claiming that I am a master coder, or a master anything. But I can tell you i've been doing my research lately as I've been expanding my skills with coding and really diving into accomplishing tasks in bulk while staying completely safe since JumpStart has stepped up their game. Part of doing these task required threading and of course along with it comes proxies and VPN's. I was tired of things randomly getting frozen and I finally dived in to figure out why it was happening.

kafkaontheshore
05-03-2017, 11:28 PM
Excellent resources, thanks for this!

TheButt
05-03-2017, 11:44 PM
|2eap Great guide! Might be helpful to make a note that when using a proxies/vpns, they can sometimes have DNS leaks. This could lead to things being traced back to your real IP address. Most premium proxies/vpns should not run into this issue but it's still a good idea to check your connection before logging into different accounts. I've been using [Only registered and activated users can see links] recently as a quick check to make sure that everything is good to go before I log into accounts I do not want associated to my main IP.

I_royalty_I
05-03-2017, 11:46 PM
Nice guide man. A lot of good information in there, especially for people who are relatively new. I second the idea of investing in private proxies and such. I've been using the same paid service for years now and it's amazing. Scraping and testing IPs is such a major pain in the ass too, let's face it.

Its remarkable to me just how much we were able to get away with on neo back in the day. Where I work now, I'm able to pull logs that are so damn detailed - it's insane. I'm sure neo had some sort of firewall in place, so Idk why they aren't doing the same. They probably don't have many technical people who can work off the cli. If they did, they'd be freezing so many more people and pulling logs to see exactly what's going on.

|2eap
05-04-2017, 05:50 AM
|2eap Great guide! Might be helpful to make a note that when using a proxies/vpns, they can sometimes have DNS leaks. This could lead to things being traced back to your real IP address. Most premium proxies/vpns should not run into this issue but it's still a good idea to check your connection before logging into different accounts. I've been using [Only registered and activated users can see links] recently as a quick check to make sure that everything is good to go before I log into accounts I do not want associated to my main IP.

Valid point my sir, I like how they explain the DNS leak. Would you recommend checking first or going ahead and doing the steps they recommend to keep DNS leaks from happening?
I know in some cases it can be leaked from Flash and others of the like, through boting it's fine but when navigating via browser it's best to use VPN I'd say?

---------- Post added at 05:50 AM ---------- Previous post was at 05:42 AM ----------


Nice guide man. A lot of good information in there, especially for people who are relatively new. I second the idea of investing in private proxies and such. I've been using the same paid service for years now and it's amazing. Scraping and testing IPs is such a major pain in the ass too, let's face it.

Its remarkable to me just how much we were able to get away with on neo back in the day. Where I work now, I'm able to pull logs that are so damn detailed - it's insane. I'm sure neo had some sort of firewall in place, so Idk why they aren't doing the same. They probably don't have many technical people who can work off the cli. If they did, they'd be freezing so many more people and pulling logs to see exactly what's going on.

Right? And with all the recent shenanigans TNT has been pulling lately it'd only make sense that they have upgraded, or incorporated their existing firewall from their other games.

It's definitely a pay for proxy if you want quality. I looked into coding my own (basic) server but i can only imagine how many people already use google app proxy's and things of the like for their own personal use. Not that advanced into that yet, but hopefully can construct something of quality in the future. We'll see though haha

Stocking Anarchy
05-04-2017, 06:15 AM
Thank you so much for the guide and great timing on it as well. I just cancelled tunnelbear yesterday because i finally got fed up with the service. Don't want to pay a monthly fee and have to turn off and back on the vpn every 5 page clicks because of time outs ugh. hoping to find another vpn that has a program + a web browser extension.

|2eap
05-04-2017, 01:41 PM
Thank you so much for the guide and great timing on it as well. I just cancelled tunnelbear yesterday because i finally got fed up with the service. Don't want to pay a monthly fee and have to turn off and back on the vpn every 5 page clicks because of time outs ugh. hoping to find another vpn that has a program + a web browser extension.

Sounds like a limited bandwidth? Is tunnelbear cloud (shared) based?

EDIT: read the FAQ its because of limited connection bandwidth. They say its unlimited, but all VPN providers slow it down to keep a load balance for all the customers.

"While you can install TunnelBear on as many devices as you'd like, you can only make up to five connections to TunnelBear on the same account at any one time."

Most web browser send threaded requests to load the page faster, you could be experiencing issues because of this? Or its just because of server overload, they seem very informative but vague in their information they provide about the service unless i'm missing the detailed area?

Stocking Anarchy
05-04-2017, 05:57 PM
Sounds like a limited bandwidth? Is tunnelbear cloud (shared) based?

EDIT: read the FAQ its because of limited connection bandwidth. They say its unlimited, but all VPN providers slow it down to keep a load balance for all the customers.

"While you can install TunnelBear on as many devices as you'd like, you can only make up to five connections to TunnelBear on the same account at any one time."

Most web browser send threaded requests to load the page faster, you could be experiencing issues because of this? Or its just because of server overload, they seem very informative but vague in their information they provide about the service unless i'm missing the detailed area?

I really don't know to be honest. Quite the noob. All I know is that I can be browsing neopets or torrenting and it will be running fine. Then all of a sudden the page takes forever to load and then will result in an error page such as took too long to respond (before this google chrome would say waiting on tunnel bear extension). On the program pretty much the same thing with the lag happens, one torrent will go through but the next one will not. Or if I am running that account checker tool with a bunch of items in the SDB it will go through maybe half of the items in the SDB then make the program stop because it can longer lookup prices on JN with the VPN on.

When I disconnect TB and reconnect that changes the IP. Then everything starts to work again for a few minutes.

It is not the error for too many connections that I do know. Before getting my own TB I was using a friends account to try it out. So I saw what that looks like, and that error shows up on the TB program when you try to connect, for the Chrome extension there is no issue.

My PC is the only one that my account is signed up with. I am paid up until the 22nd of May. Funny thing was, soon as I cancelled my service it started to work better on my Chrome extension. But I still got the issues on the PC lol.

|2eap
05-04-2017, 06:12 PM
I really don't know to be honest. Quite the noob. All I know is that I can be browsing neopets or torrenting and it will be running fine. Then all of a sudden the page takes forever to load and then will result in an error page such as took too long to respond (before this google chrome would say waiting on tunnel bear extension). On the program pretty much the same thing with the lag happens, one torrent will go through but the next one will not. Or if I am running that account checker tool with a bunch of items in the SDB it will go through maybe half of the items in the SDB then make the program stop because it can longer lookup prices on JN with the VPN on.

When I disconnect TB and reconnect that changes the IP. Then everything starts to work again for a few minutes.

It is not the error for too many connections that I do know. Before getting my own TB I was using a friends account to try it out. So I saw what that looks like, and that error shows up on the TB program when you try to connect, for the Chrome extension there is no issue.

My PC is the only one that my account is signed up with. I am paid up until the 22nd of May. Funny thing was, soon as I cancelled my service it started to work better on my Chrome extension. But I still got the issues on the PC lol.

They are throttling your bandwidth usage. it's bullshit cuz they claim unlimited bandwidth but in the fine print they say they limit you if they feel like its excessive use to make a "better experience for everyone".

thats why when you change form one ip to another the bandwidth for that ip hasnt been used up yet or overloaded so to speak.

With private proxies, some don't allow torrent downloads either etc becuase of the usage it uses.

Also if you use the same ip on a website, they majority of the time temp ban/ throttle the ip to take off some server load.

I noticed the same thing when scraping information from jellyneo.

To combat this i added timeouts to my requests and a retry if it does lag out after adding a small pause.

Stocking Anarchy
05-04-2017, 08:38 PM
They are throttling your bandwidth usage. it's bullshit cuz they claim unlimited bandwidth but in the fine print they say they limit you if they feel like its excessive use to make a "better experience for everyone".

thats why when you change form one ip to another the bandwidth for that ip hasnt been used up yet or overloaded so to speak.

With private proxies, some don't allow torrent downloads either etc becuase of the usage it uses.

Also if you use the same ip on a website, they majority of the time temp ban/ throttle the ip to take off some server load.

I noticed the same thing when scraping information from jellyneo.

To combat this i added timeouts to my requests and a retry if it does lag out after adding a small pause.


Ah and so because I have fiber and can do stuff super fast that is why i notice it happening so quickly?

Just did a speed test right after turning it on for chrome.
Speed test firefox 96.56 download 95.23 upload 10 ms ping
Speed test chrome with extension on 92.56 download 81.29 upload 73 ms ping

|2eap
05-04-2017, 09:56 PM
Ah and so because I have fiber and can do stuff super fast that is why i notice it happening so quickly?

Just did a speed test right after turning it on for chrome.
Speed test firefox 96.56 download 95.23 upload 10 ms ping
Speed test chrome with extension on 92.56 download 81.29 upload 73 ms ping
wow you got fiber? Bruhhhh, let me come move to your town

Accelerator
05-05-2017, 12:20 AM
Nice informative post, fix some of the grammatical errors and I'll +rep :D (nitpicking here e.e). Hopefully this reduces the amount of threads asking similar questions.
A few things:
Most bots use either an old ass version of IE or Firefox as the default user agent, not chrome. Most bots come with the option to set your own/custom user agent nowadays tho'.
A VPN doesn't really limit users to a single account if you use virtual machines, but that wouldn't really be practical (turning on/off a VPN client is already a pain in the a�� for some people so I'd imagine having to set up and start a VM would be hell for them) it would also require more resources. Some clients allow you to choose which apps connect through the VPN though, so that's kinda useful for some.
Same with browsers and user agents, I know for a fact that if you want to fully spoof your user agent with Firefox you gotta do some extra tweaks on the about:config page. Modifying the headers isn't enough for some pages.
Always test your IPs and user agents with multiple pages/tools as not all of them use the same method(s).

|2eap
05-05-2017, 02:25 AM
Nice informative post, fix some of the grammatical errors and I'll +rep :D (nitpicking here e.e). Hopefully this reduces the amount of threads asking similar questions.
A few things:
Most bots use either an old ass version of IE or Firefox as the default user agent, not chrome. Most bots come with the option to set your own/custom user agent nowadays tho'.
A VPN doesn't really limit users to a single account if you use virtual machines, but that wouldn't really be practical (turning on/off a VPN client is already a pain in the a•• for some people so I'd imagine having to set up and start a VM would be hell for them) it would also require more resources. Some clients allow you to choose which apps connect through the VPN though, so that's kinda useful for some.
Same with browsers and user agents, I know for a fact that if you want to fully spoof your user agent with Firefox you gotta do some extra tweaks on the about:config page. Modifying the headers isn't enough for some pages.
Always test your IPs and user agents with multiple pages/tools as not all of them use the same method(s).

I agree with the VPS solution for VPN's but that sounds like another guide for another day.

All valid points, but I believe to be for a little bit more experienced. My mistake to about the Chrome statement, i use and code only python bots, and from what i've collected they were Chrome on a windows 7 64bit. So only imagined everyone copied everyone elses headers when they coded their bots. With the exception of Joe's bots of course. But I think whatever browser I go with, it gets the point across.

It does have grammatical errors, I can assure that. But I wrote it without doing a thorough review. Not in it for the rep but to inform, affiliate, and monetize my business as well as invite an intellectual conversation about the topic. So i'm pleased with your response, it makes me wonder if I should write a second guide for the more advanced?

But one thing that has to be clear though for the lurker. A VPN does funnel all your traffic through a single IP on whatever it's host machine is though, for all your traffic. Since its operating on the OS level. There are some exceptions, but for the basic Neopets player using someone else's coded bots, I don't think those exceptions will come to play.

I do everything via bot with Neopets so thats why I really encourage quality private proxies, which really you just gotta pay more if your worried about leakage. But if your browsing via a browser i'd go with a VPN since the possibility of vulnerability from Flash objects and things of the like which may not render using your internets or browsers proxy settings. Since some browsers (like chrome) use your systems default internet options.

As for spoofing on browsers, its a bit irrelevant don't you think? Since you'd be assigning your normal browsing user-agent to the bot that is boting for your account. That being said, I've never tried it so I don't know how to do it. Then again, I never really saw a reason to since I do everything via bots.

Whichever the case may be, outdated bots are using outdated user-agents, and most bots don't have the option's easily accessible. Which is really what I think we should be moving towards. Not everyone will have the patience or time to look up user-agents to use for each of their accounts, but if we incorporated the latest with our bots and gave options. To keep it a bit more controlled (and still offer the option of a custom user-agent for the savvy).

I also want to encourage others to learn to code as I've taught myself to just because of the sloppy coding I was experiencing in my language of choice, and opening topics like this will make other coders go back and adjust their code to make them better. Or maybe even encourage someone to code a bot that is already made but incorporates more safety protocols since Joe hasn't coded everything... yet xD

Accelerator
05-05-2017, 02:47 PM
I agree with the VPS solution for VPN's but that sounds like another guide for another day.

All valid points, but I believe to be for a little bit more experienced. My mistake to about the Chrome statement, i use and code only python bots, and from what i've collected they were Chrome on a windows 7 64bit. So only imagined everyone copied everyone elses headers when they coded their bots. With the exception of Joe's bots of course. But I think whatever browser I go with, it gets the point across.

It does have grammatical errors, I can assure that. But I wrote it without doing a thorough review. Not in it for the rep but to inform, affiliate, and monetize my business as well as invite an intellectual conversation about the topic. So i'm pleased with your response, it makes me wonder if I should write a second guide for the more advanced?

But one thing that has to be clear though for the lurker. A VPN does funnel all your traffic through a single IP on whatever it's host machine is though, for all your traffic. Since its operating on the OS level. There are some exceptions, but for the basic Neopets player using someone else's coded bots, I don't think those exceptions will come to play.

I do everything via bot with Neopets so thats why I really encourage quality private proxies, which really you just gotta pay more if your worried about leakage. But if your browsing via a browser i'd go with a VPN since the possibility of vulnerability from Flash objects and things of the like which may not render using your internets or browsers proxy settings. Since some browsers (like chrome) use your systems default internet options.

As for spoofing on browsers, its a bit irrelevant don't you think? Since you'd be assigning your normal browsing user-agent to the bot that is boting for your account. That being said, I've never tried it so I don't know how to do it. Then again, I never really saw a reason to since I do everything via bots.

Whichever the case may be, outdated bots are using outdated user-agents, and most bots don't have the option's easily accessible. Which is really what I think we should be moving towards. Not everyone will have the patience or time to look up user-agents to use for each of their accounts, but if we incorporated the latest with our bots and gave options. To keep it a bit more controlled (and still offer the option of a custom user-agent for the savvy).

I also want to encourage others to learn to code as I've taught myself to just because of the sloppy coding I was experiencing in my language of choice, and opening topics like this will make other coders go back and adjust their code to make them better. Or maybe even encourage someone to code a bot that is already made but incorporates more safety protocols since Joe hasn't coded everything... yet xD
Oh, yeah. Most python scripts have Chrome on Windows 7/8/8.1/10 x64 as the default user agent, I was referring to most compiled/executables. It all depends on the developer's preferred browser to be honest.
I'd personally like to see a more advanced guide to "test" my knowledge and see if I'm missing some stuff, etc.

Never said a VPN doesn't encrypt and mask your traffic system-wide e.e. I just said that you're not really limited to the host system, for people that know about VMs. You can set up VMs and run the VPN on each guest system but like I said, it wouldn't be practical.

There are ways to tunnel all your traffic through a proxy, without having to worry when the proxy fails (it'll simply not connect).

Not irrelevant IMHO, it would be extremely​ easy for TNT to track who's using an old bot that doesn't allow users to input an updated/current user agent, like you said. That also has a fix, but it would be complicated (I'm guessing) for the average user.

Implementing predefined and up-to-date user agent options sounds good for the user(s), but also sounds like it would be a pain in the a�� for the coder(s) as they'd need to update their bots when a new browser version/release is out, without considering multiple OSes/platforms. Unless you can retrieve the strings from a website.

Sent from my SM-G530M using Tapatalk

|2eap
05-05-2017, 04:31 PM
Oh, yeah. Most python scripts have Chrome on Windows 7/8/8.1/10 x64 as the default user agent, I was referring to most compiled/executables. It all depends on the developer's preferred browser to be honest.
I'd personally like to see a more advanced guide to "test" my knowledge and see if I'm missing some stuff, etc.

Never said a VPN doesn't encrypt and mask your traffic system-wide e.e. I just said that you're not really limited to the host system, for people that know about VMs. You can set up VMs and run the VPN on each guest system but like I said, it wouldn't be practical.

There are ways to tunnel all your traffic through a proxy, without having to worry when the proxy fails (it'll simply not connect).

Not irrelevant IMHO, it would be extremely​ easy for TNT to track who's using an old bot that doesn't allow users to input an updated/current user agent, like you said. That also has a fix, but it would be complicated (I'm guessing) for the average user.

Implementing predefined and up-to-date user agent options sounds good for the user(s), but also sounds like it would be a pain in the a•• for the coder(s) as they'd need to update their bots when a new browser version/release is out, without considering multiple OSes/platforms. Unless you can retrieve the strings from a website.

Sent from my SM-G530M using Tapatalk

theres api to get the current and latest user-agents, each time you start your bot you could update your database or parse the info. it's actually really easy to implement though, and i agree with the way Joe has it setup ideally, since users don't update to the latest always or immediately.

People generally won't know that the outdated bots are using different user-agents. Since most people don't know what a User-Agent is when it comes to header data. And idk if many people know how to de-compile or monitor through like charlesproxy or something and see what headers the bot is sending.

But I totally agree with you man, i just think its a little bit more advanced than what was being touched on. And i was only stating the vpn portion in my reply because when someone who has little to no knowledge reads it, they could get a false impression. One thing i've learned with marketing you have to consider your audience naive and lazy (even when they aren't). The laziness is everyone though, we'd rather click a button and have it done for us rather than figure it out ourselves. amirite? xD

And naive isn't something to be interpreted as an insult either. I'm naive in many ways myself. But I just haven't learned yet, thats all.

And most paid for private proxies disable your browsing experience if there is any kind of failure on their side, when i made that notion it was towards free proxies, but i hate those damn things (little biased) xD But even then you could code your own application to funnel your proxy settings, or use an extension.

When botting i did make a check to ensure the IP was changed, but quickly realized those IP checking sites will throttle your IP so fast. So i turned to researching quality providers of proxies so I wouldn't have to worry of such things. That's why I recommended the ones I recommended as well. There are plenty of others though, if you have some suggestions please do tell me and give me your experiences with them and research so i can include it in the list.

Do need to modify the guide some more though, and do a thorough review as you suggested. If you write a guide about proxies and tunneling i'm more than happy to link to it in context when areas need and could be further expanded upon.

Oh and explain to me more about browser spoofing through config? Could get an extension to do this too though right? For people who wouldn't feel comfortable editing the config?

Accelerator
05-05-2017, 08:58 PM
theres api to get the current and latest user-agents, each time you start your bot you could update your database or parse the info. it's actually really easy to implement though, and i agree with the way Joe has it setup ideally, since users don't update to the latest always or immediately.

People generally won't know that the outdated bots are using different user-agents. Since most people don't know what a User-Agent is when it comes to header data. And idk if many people know how to de-compile or monitor through like charlesproxy or something and see what headers the bot is sending.

But I totally agree with you man, i just think its a little bit more advanced than what was being touched on. And i was only stating the vpn portion in my reply because when someone who has little to no knowledge reads it, they could get a false impression. One thing i've learned with marketing you have to consider your audience naive and lazy (even when they aren't). The laziness is everyone though, we'd rather click a button and have it done for us rather than figure it out ourselves. amirite? xD

And naive isn't something to be interpreted as an insult either. I'm naive in many ways myself. But I just haven't learned yet, thats all.

And most paid for private proxies disable your browsing experience if there is any kind of failure on their side, when i made that notion it was towards free proxies, but i hate those damn things (little biased) xD But even then you could code your own application to funnel your proxy settings, or use an extension.

When botting i did make a check to ensure the IP was changed, but quickly realized those IP checking sites will throttle your IP so fast. So i turned to researching quality providers of proxies so I wouldn't have to worry of such things. That's why I recommended the ones I recommended as well. There are plenty of others though, if you have some suggestions please do tell me and give me your experiences with them and research so i can include it in the list.

Do need to modify the guide some more though, and do a thorough review as you suggested. If you write a guide about proxies and tunneling i'm more than happy to link to it in context when areas need and could be further expanded upon.

Oh and explain to me more about browser spoofing through config? Could get an extension to do this too though right? For people who wouldn't feel comfortable editing the config?
Are they available for multiple coding languages though? xD
Joe doesn't use that API as far as I know, the default user agent set for both Majin V2 and stealth core is Firefox version 40 on Windows 10 x64
I've seen some of them, that's why I said most bots use (or used to use) an old version of either internet explorer or Firefox.
I know and I agree, who doesn't want everything automated? [emoji14]
That thing I said about not having to worry if the proxy fails was related to the use of free proxies. Sure, it'll be a pain when they fail and you send/submit a POST as you'll have to resend and confirm (if you use a browser) or the program will give you an error and sometimes even stop working, but it won't actually leak your regular IP.
Glad to read that you're willing to make this guide as complete and "perfect" as possible ;). Unfortunately I don't have the time to write a guide about this atm, but it'll try to.
I'll give you more info via pm so you can update/add that to this guide, about spoofing your user agent on Firefox (in case some people don't use bots for absolutely everything). I'm sure there's add-ons/extensions that do that for you but sometimes it's good to know what the browser add-on does, in case it ever gets removed or there's a change with how things work (which will happen soon with Firefox IIRC).

Sent from my SM-G530M using Tapatalk

|2eap
05-05-2017, 09:09 PM
Are they available for multiple coding languages though? xD
Joe doesn't use that API as far as I know, the default user agent set for both Majin V2 and stealth core is Firefox version 40 on Windows 10 x64
I've seen some of them, that's why I said most bots use (or used to use) an old version of either internet explorer or Firefox.
I know and I agree, who doesn't want everything automated? [emoji14]
That thing I said about not having to worry if the proxy fails was related to the use of free proxies. Sure, it'll be a pain when they fail and you send/submit a POST as you'll have to resend and confirm (if you use a browser) or the program will give you an error and sometimes even stop working, but it won't actually leak your regular IP.
Glad to read that you're willing to make this guide as complete and "perfect" as possible ;). Unfortunately I don't have the time to write a guide about this atm, but it'll try to.
I'll give you more info via pm so you can update/add that to this guide, about spoofing your user agent on Firefox (in case some people don't use bots for absolutely everything). I'm sure there's add-ons/extensions that do that for you but sometimes it's good to know what the browser add-on does, in case it ever gets removed or there's a change with how things work (which will happen soon with Firefox IIRC).

Sent from my SM-G530M using Tapatalk

Sounds good man thank you!

As for the api its REALLY simple. It's through a page curl which processes php on their end and results with a json object from what i've read here.
[Only registered and activated users can see links]

However, I use fake-useragent which is python based but most python modules are duplicated in other languages, just would need to find it.

But honestly, just having the option to choose what OS your coming from would be more than suffice so you could at least match with what you normally browse with.
Otherwise they would have to spoof their browser to match the bot, which seems backwards. Does spoofing your browser log you out of things that you are otherwise normally logged into like gmail? and how does gmail handle it when you try to relogin?

Accelerator
05-05-2017, 10:09 PM
Sounds good man thank you!

As for the api its REALLY simple. It's through a page curl which processes php on their end and results with a json object from what i've read here.
[Only registered and activated users can see links]

However, I use fake-useragent which is python based but most python modules are duplicated in other languages, just would need to find it.

But honestly, just having the option to choose what OS your coming from would be more than suffice so you could at least match with what you normally browse with.
Otherwise they would have to spoof their browser to match the bot, which seems backwards. Does spoofing your browser log you out of things that you are otherwise normally logged into like gmail? and how does gmail handle it when you try to relogin?
Sounds easy/practical, cURL is also cross-platform so that's a plus (I've seen binaries for the three major operating​ systems at least)
Guessing that's a python library/module? Never seen it used in any script e.e
I'm one of those people that only uses a single browser for everything (<3 Firefox) and it should be the other way around, match the bot's user agent with the browser's user agent.

Nope, spoofing the user agent doesn't really affect anything, with the exception of how a page renders. Keeps my cookies so I don't have to log in again. But it should work as it usually does.

Sent from my SM-G530M using Tapatalk

|2eap
05-06-2017, 12:59 AM
Sounds easy/practical, cURL is also cross-platform so that's a plus (I've seen binaries for the three major operating​ systems at least)
Guessing that's a python library/module? Never seen it used in any script e.e
I'm one of those people that only uses a single browser for everything (<3 Firefox) and it should be the other way around, match the bot's user agent with the browser's user agent.

Nope, spoofing the user agent doesn't really affect anything, with the exception of how a page renders. Keeps my cookies so I don't have to log in again. But it should work as it usually does.

Sent from my SM-G530M using Tapatalk

same session cookies with a new user-agent hasn't caused you any issues?

fake-useragent? Yea no one else uses it for now, i completely re-modified the neoaccount class everyone was using to make it more stable and safer.


Got your pm though, i'll make some adjustments to the guide

Accelerator
05-06-2017, 01:18 AM
same session cookies with a new user-agent hasn't caused you any issues?

fake-useragent? Yea no one else uses it for now, i completely re-modified the neoaccount class everyone was using to make it more stable and safer.


Got your pm though, i'll make some adjustments to the guide
Well, like I said, I only use a single browser when I'm on a desktop and it's Firefox (doesn't matter which browser I'm actually using e.e)
I can even make the Tapatalk app look like I'm on a desktop browser (no actual benefit from doing that though, LMAO) but only when I'm connected to my home network.
I've forgotten to switch back to my usual user agent a few times and Gmail has never given me any problem ;)

Sent from my SM-G530M using Tapatalk

Sentara
05-08-2017, 09:18 AM
Excellent guide. Very informative and well thought out, quite a treat given how difficult it is to find guides like this one.

Would you mind if I shoot you a PM |2eap over one VPN service? I've been checking a few VPNs out there and noticed one that offers double data encryption and an automatic kill switch (if the tunneling drops, the provided service will automtically shut down whatever webpages you were accessing during the session), which sounds incredibly comfy for my lazy ass haha :D

palooza
06-29-2017, 10:36 AM
I'm pretty much a noob to this but I have a question. Would TNT flag you for randomly changing or masking your IP address out of the blue?

I'm thinking about getting a VPN to protect my privacy (and also account on Neopets against scammers/cookie grabbers/etc). I'm just wondering whether I could potentially get frozen for suddenly masking my IP address or changing it.

Synth Salazzle
06-29-2017, 12:50 PM
Thanks for this!