Many years ago I programed a console based multi protocol proxy (the sha0proxy) lately I created in dotnet a graphical verison of the tool, but due to the form referesh speed finally I implemented it in C++ with Qt.
This tool useful for reversing, exploiting & pentesting was finally called rproxy, and its a multi-protocol proxy over TCP or UDP.
Being in the middle of the communication you can view and modify the bytes before being sent to the client or server.
In the tools tab right now its possible to open the blob on radare2 for further reversing of the data structures or code.
A basic mutation based fuzzer is implemented for bug-hunting, just set the % ratio of mutation and the bytes will be modified during specific communications phase.
One of the powerful things of this tool is the scripting, it is possible to automate a modification in specific moment of the traffic flow.
For example a script with a single line: "IN 3 20 3F" will write a 0x3f on the offset 20 only on the third packet received from the server. I have used this feature for triggering vulnerabilities.
Regarding the saving and loading data from disk, it's possible to save and load data in raw and hex formats. Also can be configured for save all the communications or only specific emission.
Related word
- Hacking Tools Windows
- Hacking Tools Online
- Install Pentest Tools Ubuntu
- Hacker Tools Free
- Hack Tools Download
- Hack App
- Best Pentesting Tools 2018
- Hacking Tools Github
- Hack Tool Apk
- How To Install Pentest Tools In Ubuntu
- Hacker Tools Free Download
- Hacking Tools Name
- How To Install Pentest Tools In Ubuntu
- Hack Tool Apk No Root
- Nsa Hack Tools
- Hacking Apps
- How To Install Pentest Tools In Ubuntu
- Hacker Tools Apk Download
- Install Pentest Tools Ubuntu
- Pentest Tools Windows
- Hacker Hardware Tools
- Hacking Tools For Mac
- Pentest Tools Apk
- Hacking Tools For Games
- Hackers Toolbox
- Pentest Tools Kali Linux
- Hacker Techniques Tools And Incident Handling
- Pentest Tools For Windows
- Nsa Hack Tools
- Hacking Tools 2020
- Pentest Tools Website Vulnerability
- Hack Tools Mac
- What Are Hacking Tools
- Pentest Tools Url Fuzzer
- Hacking Tools 2020
- Hacker Tools 2020
- Pentest Tools List
- Hacker Tools Windows
- Hacking Tools For Mac
- How To Make Hacking Tools
- Hacking Tools For Windows Free Download
- Pentest Tools Android
- Pentest Tools Android
- Pentest Tools Kali Linux
- Hacking Tools For Pc
- Nsa Hack Tools
- Hacking Tools Windows
- Hacker Techniques Tools And Incident Handling
- Hacks And Tools
- Pentest Tools Find Subdomains
- Pentest Tools For Ubuntu
- Hack Tools For Pc
- Pentest Automation Tools
- Wifi Hacker Tools For Windows
- Pentest Box Tools Download
- Hacker Tools Free
- Pentest Tools Apk
- Hacker Tools
- Hack Rom Tools
- Hacking Tools 2019
- Computer Hacker
- Hak5 Tools
- Hacker Tools For Pc
- Hack Rom Tools
- Hacking Tools Software
- Top Pentest Tools
- How To Hack
- Bluetooth Hacking Tools Kali
- Pentest Tools Kali Linux
- Pentest Tools For Mac
- Pentest Tools Online
- Pentest Tools For Ubuntu
- Tools Used For Hacking
- Hack Tools Pc
- Hack Tools Mac
- Best Pentesting Tools 2018
- How To Make Hacking Tools
- Hack Apps
- Pentest Automation Tools
- Hacker Techniques Tools And Incident Handling
- Hack Tools
- Hacking Tools Windows
- Hacking Tools For Games
- Hacking Tools Free Download
- Hack Tools For Games
- Wifi Hacker Tools For Windows
- Top Pentest Tools
- Nsa Hack Tools Download
- Hack Apps
- Hacking Tools Free Download
- Hacker Tools Hardware
- Pentest Tools Github
- How To Make Hacking Tools
- Pentest Tools Apk
- Pentest Tools Windows
- Pentest Tools Apk
- Best Hacking Tools 2020
- Pentest Box Tools Download
- Best Hacking Tools 2020
- Easy Hack Tools
- Hacker Hardware Tools
- Pentest Tools For Mac
- Hacking Tools
- Github Hacking Tools
- Hack Tools
- Pentest Tools Windows
- Hacker Tool Kit
- Hacker Tools 2019
- Pentest Tools Open Source
- Hacking Tools Mac
- Hacker Techniques Tools And Incident Handling
- Top Pentest Tools
- Pentest Tools
- Nsa Hack Tools Download




0 comments: on "Multi-Protocol Proxy Over TCP & UDP"
Post a Comment