TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Sniffing the Unsniffable on Windows

26 pointsby markgamachealmost 16 years ago

4 comments

estalmost 16 years ago
alternatively if you want SYSTEM privileged cmd.exe on Windows XP (not on Vista, sorry) and you don't have SysInternal's psexec, you can try this:<p><pre><code> C:\&#62; time /t 9:42 C:\&#62; at 9:43 /interactive cmd </code></pre> then at 9:43 a cmd.exe shell pops up.<p>And HTTPAnalyzer could sniff HTTPS traffic easily. It's DLL injection and it can un-gzip data.
评论 #741688 未加载
joshualmost 16 years ago
"sniffing the unsniffable" sounds way more racy than it ought to.
FahnRobieralmost 16 years ago
stunnel is also a nice way to debug ssl connections when you only control one side of the connection: <a href="http://www.stunnel.org/examples/" rel="nofollow">http://www.stunnel.org/examples/</a><p>As a client, you would stunnel local:389 to remote:636. As a server you would stunnel local:636 to local:389.<p>Then you can sniff on the unencrypted port with wireshark,etc.<p>Thanks for the pointer to detours.
rawralmost 16 years ago
I am very pleased to see a legitimate post about hacking on Hacker News. Well played, sir.<p>I have similar feelings about Detours. Microsoft Research is in their own little world sometimes.
评论 #740222 未加载