TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Sniffing the Unsniffable on Windows

26 点作者 markgamache将近 16 年前

4 条评论

est将近 16 年前
alternatively if you want SYSTEM privileged cmd.exe on Windows XP (not on Vista, sorry) and you don't have SysInternal's psexec, you can try this:<p><pre><code> C:\&#62; time /t 9:42 C:\&#62; at 9:43 /interactive cmd </code></pre> then at 9:43 a cmd.exe shell pops up.<p>And HTTPAnalyzer could sniff HTTPS traffic easily. It's DLL injection and it can un-gzip data.
评论 #741688 未加载
joshu将近 16 年前
"sniffing the unsniffable" sounds way more racy than it ought to.
FahnRobier将近 16 年前
stunnel is also a nice way to debug ssl connections when you only control one side of the connection: <a href="http://www.stunnel.org/examples/" rel="nofollow">http://www.stunnel.org/examples/</a><p>As a client, you would stunnel local:389 to remote:636. As a server you would stunnel local:636 to local:389.<p>Then you can sniff on the unencrypted port with wireshark,etc.<p>Thanks for the pointer to detours.
rawr将近 16 年前
I am very pleased to see a legitimate post about hacking on Hacker News. Well played, sir.<p>I have similar feelings about Detours. Microsoft Research is in their own little world sometimes.
评论 #740222 未加载