Baghdad Exploit
Quartinal
Previously known as Incognito on the sign-in screen, shared by Brandon421-ops after being informed by Ashton Davies

GitHub Discord

Browsing within the captive portal window on the sign-in screen. Credits to the creators of the 52.207.185.90 DNS Name Server exploit.

    Instructions

  1. First, sign out of your Chromebook.
  2. Make sure you are using a Wi-Fi with custom DNS capabilities.
  3. Click the settings button located at the top right of the Wi-Fi panel.
  4. Set Name servers to Custom name servers.
  5. Set the first Custom name servers value to 52.207.185.90.
  6. Afterwards, you will see a link in the normal district login window that says Visit this network's sign-in page.
  7. Once you see the sign-in page with a black background, click on the link Webview link for tests.
  8. Now, finally, you can browse the entire web freely without the annoyance of filtering extensions blocking websites!
  9. Please note that the unblocked browser window will disappear after roughly one minute.