alternatively if you want SYSTEM privileged cmd.exe on Windows XP (not on Vista, sorry) and you don't have SysInternal's psexec, you can try this:<p><pre><code> C:\> time /t
9:42
C:\> at 9:43 /interactive cmd
</code></pre>
then at 9:43 a cmd.exe shell pops up.<p>And HTTPAnalyzer could sniff HTTPS traffic easily. It's DLL injection and it can un-gzip data.
stunnel is also a nice way to debug ssl connections when you only control one side of the connection:
<a href="http://www.stunnel.org/examples/" rel="nofollow">http://www.stunnel.org/examples/</a><p>As a client, you would stunnel local:389 to remote:636.
As a server you would stunnel local:636 to local:389.<p>Then you can sniff on the unencrypted port with wireshark,etc.<p>Thanks for the pointer to detours.
I am very pleased to see a legitimate post about hacking on Hacker News. Well played, sir.<p>I have similar feelings about Detours. Microsoft Research is in their own little world sometimes.