hec·hek's Blog

Various private stuff

Feb 16, 2017 · 1 minute read · Comments · install

Use Paimei Stalker or Similar tools (by Pedram Amini)

SetBP(Address, function_to_call_when_the_address_is_reached) Twitch died again :( Monitor the environment. Use these tools. * Linux: strace and ltrace. * On Windows : Process Monitor. Example from a CTF. Mixer: It needed a certain library. So you have to install all dependencies. Use “ldd” to check if you have everything. LD_LIBRARY_PATH environmental variable. readelf -l binaryname will show us which loader is needed for this library. It loaded the application in GDB but could not debug.

Feb 16, 2017 · 3 minute read · Comments · css

Why do I Need to Know How Proxies Work?

Note that the RFC instructs clients to send the absolute-URI no matter what (even if they are using a CONNEC request) as we will see shortly. The proxy uses this absolute-URI to forward the request to the endpoint (in this case Yahoo!). Both forwarding and TLS terminating proxies work similarly in this case because they both can look inside HTTP payloads. HTTP proxy in action HTTP proxy in action Browser establishes a TCP connection to proxy.

Feb 16, 2017 · 5 minute read · Comments · blog

Thick Client Proxying - Part 6: How HTTP(s) Proxies Work

In order to create our own custom proxies, first we need to know how proxies work. When I wanted to write a custom proxy tool (it’s a simple Python script) in Hipchat part3, I had to go back and learn how they work. I did not find such a resource online that looked at proxies from an infosec perspective. Most talked about how to configure caching or forwarding proxies and not much about MitM ones.