Baghdad Exploit
Quartinal
Previously known as Incognito on the sign-in screen, shared by Brandon421-ops after being informed by Ashton Davies
GitHub Discord Browsing within the captive portal window on the sign-in screen. Credits to the creators of the 52.207.185.90 DNS Name Server exploit.
- First, sign out of your Chromebook.
- Make sure you are using a Wi-Fi with custom DNS capabilities.
- Click the settings button located at the top right of the Wi-Fi panel.
- Set
Name servers
toCustom name servers
. - Set the first
Custom name servers
value to52.207.185.90
. - Afterwards, you will see a link in the normal district login window that says
Visit this network's sign-in page
. - Once you see the sign-in page with a black background, click on the link
Webview link for tests
. - Now, finally, you can browse the entire web freely without the annoyance of filtering extensions blocking websites!
- Please note that the unblocked browser window will disappear after roughly one minute.