Penetration Testing mailing list archives

Re: Help on TCP interception tool


From: psiinon <psiinon () gmail com>
Date: Mon, 7 Feb 2011 07:12:14 +0000

The open source variant of Paros hasnt been updated for many years.
However the OWASP Zed Attack Proxy
is a fork of Paros and is under active development.
See http://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project
for more details.

Many thanks,

Psiinon

On Sat, Feb 5, 2011 at 10:13 AM, Erik Hjelmvik <erik.hjelmvik () gmail com> wrote:
There is a great little tool you can use on Windows called Proxocket.
I mostly use it to sniff traffic from local applications (it even
grabs localhost traffic), but it can be used to modify traffic before
it is sent or received by the application.

You can read more about Proxocket here:
http://www.netresec.com/?page=Blog&month=2011-01&post=Proxocket---A-Winsock-Proxy-Sniffer

Enjoy!

/erik

2010/12/11 Srikanth kovuri <tosrikanthkr () gmail com>:
if you want to intercept http traffic you can use proxy tools like
paros as suggested above. But if you are looking for any client server
program on TCP you can try using tcpreplay tool.

http://tcpreplay.synfin.net/wiki/FAQ

Thanks
Srikanth

On 12/10/10, Adrien JOLIBERT <jolibert () gmail com> wrote:
I'd rather home made tools, but you can check for one called Paros, it
uses the JAVA platform
Their website (http://www.parosproxy.org/download.shtml) seems down,
you may look on google
(http://www.google.com/search?&q=paros+proxy+intitle%3Aindex.of)

On Thu, Dec 9, 2010 at 2:27 PM, Vedantam Sekhar
<vedantamsekhar () gmail com> wrote:

I am looking for a tool that sits between my client programm&amp;the s=
erver, gives the ability to manipulate the TCP packets before it goes out
o=
f the wire. Is there any such tool available?

Thanks for the help...

Sekhar

------------------------------------------------------------------------
This list is sponsored by: Information Assurance Certification Review
Board

Prove to peers and potential employers without a doubt that you can
actually do a proper penetration test. IACRB CPT and CEPT certs require a
full practical examination in order to become certified.

http://www.iacertification.org
------------------------------------------------------------------------


------------------------------------------------------------------------
This list is sponsored by: Information Assurance Certification Review Board

Prove to peers and potential employers without a doubt that you can actually
do a proper penetration test. IACRB CPT and CEPT certs require a full
practical examination in order to become certified.

http://www.iacertification.org
------------------------------------------------------------------------



------------------------------------------------------------------------
This list is sponsored by: Information Assurance Certification Review Board

Prove to peers and potential employers without a doubt that you can actually do a proper penetration test. IACRB CPT 
and CEPT certs require a full practical examination in order to become certified.

http://www.iacertification.org
------------------------------------------------------------------------



------------------------------------------------------------------------
This list is sponsored by: Information Assurance Certification Review Board

Prove to peers and potential employers without a doubt that you can actually do a proper penetration test. IACRB CPT 
and CEPT certs require a full practical examination in order to become certified.

http://www.iacertification.org
------------------------------------------------------------------------



------------------------------------------------------------------------
This list is sponsored by: Information Assurance Certification Review Board

Prove to peers and potential employers without a doubt that you can actually do a proper penetration test. IACRB CPT 
and CEPT certs require a full practical examination in order to become certified. 

http://www.iacertification.org
------------------------------------------------------------------------


Current thread: