ПРОЕКТЫ 


  АРХИВ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  СТАТЬИ 


  ПЕРСОНАЛЬНОЕ 


  ПРОГРАММЫ 



ПИШИТЕ
ПИСЬМА














     АРХИВ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] FYI: Echo Mirage: A Generic Win32 Network Communications Proxy




> -----Original Message-----
> From: listbounce@xxxxxxxxxxxxxxxxx 
> [mailto:listbounce@xxxxxxxxxxxxxxxxx] On Behalf Of Dave
> Sent: Saturday, September 23, 2006 1:53 PM
> To: binaryanalysis@xxxxxxxxxxxxxxxxx
> Subject: Echo Mirage: A Generic Win32 Network Communications Proxy
> 
> http://www.bindshell.net/echomirage
> 
> Echo Mirage is a generic network proxy. It uses DLL injection 
> and function
> hooking to redirect network related function calls so that 
> data transmitted
> and received by local applications can be observed and modified.
> 
> Think of it as Odysseus (or Burp, if you prefer) that will 
> proxy (almost)
> anything...
> 
> Windows encryption and OpenSSL functions are also hooked so 
> that the plain
> text of data being sent and received over an encrypted session is also
> available.
> 
> Echo Mirage tries to be smart with the OpenSSL calls by monitoring
> ssl_set_fd() and ssl_connect() to determine when SSL is in use on a
> particular socket.  When SSL is in use the encrypted stream 
> is ignored and
> only the unencrypted data is processed.  This doesn't work 
> for the windows
> SSL stuff because that functions in an entirely different way...
> 
> Traffic can be intercepted in real-time, or manipulated with regular
> expressions and action scripts.
> 
> -- 
> Two fish are in a tank.
> One turns to the other and says 'I'll man the guns. You drive.'
> 



 




Copyright © Lexa Software, 1996-2009.