sslhook-master

所属分类:钩子与API截获
开发工具:C/C++
文件大小:20KB
下载次数:0
上传日期:2018-08-09 08:49:02
上 传 者po4talion
说明:  SSLHOOK is a Win32 DLL that allows hooking of the OpenSSL functions SSL_read and SSL_write.

文件列表:
LICENCE.TXT (1055, 2014-07-08)
sslhook.sln (1325, 2014-07-08)
sslhook (0, 2014-07-08)
sslhook\Trace.c (1686, 2014-07-08)
sslhook\Trace.h (983, 2014-07-08)
sslhook\detours.h (18673, 2014-07-08)
sslhook\install.cpp (724, 2014-07-08)
sslhook\modnotify.cpp (1861, 2014-07-08)
sslhook\modnotify.h (2161, 2014-07-08)
sslhook\nodebug.cpp (579, 2014-07-08)
sslhook\openssl.cpp (5496, 2014-07-08)
sslhook\pcap.cpp (4656, 2014-07-08)
sslhook\pcap.h (577, 2014-07-08)
sslhook\sslhook.cpp (8261, 2014-07-08)
sslhook\sslhook.def (66, 2014-07-08)
sslhook\sslhook.vcxproj (4550, 2014-07-08)
sslhook\sslhook.vcxproj.filters (1968, 2014-07-08)
sslhook_sample.ini (581, 2014-07-08)

sslhook ------- SSLHOOK is a Win32 DLL that allows hooking of the OpenSSL functions SSL_read and SSL_write. Version 1 is designed to work against statically-compiled versions of OpenSSL (rather than the DLL version). As such sslhook requires some preconfiguration, which requires knowledge of the relative addresses of the SSL_read and SSL_write functions in the target binary. Installation ------------ Running SSLHOOK on Win32 requires the following registry settings: > HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows > AppInit_DLLs: > LoadAppInit_DLLs: 0x1 On ***bit windows: > HKEY_LOCAL_MACHINE\SOFTWARE\Wow***32Node\Microsoft\Windows NT\CurrentVersion\Windows > AppInit_DLLs: > LoadAppInit_DLLs: 0x1 Configuration ------------- Configuration is by way of an INI file. SSLHOOK will read a file called sslhook.ini that must exist in the same directory as sslhook.dll. Each process to target must have its own section in the INI file, and the RVA (relative virtual address) of SSL_Read and SSL_Write provided. The DLL that the OpenSSL functions are linked into must also be specified withe the targetDLL parameter. For example: > [target.exe] > targetDLL=BASENAME.DLL > SSL_Read=10001234 ; the RVA of SSL_Read > SSL_Read=10004567 ; the RVA of SSL_Write Capturing output ---------------- Output can be captured through the SysInternals DebugView program. Output is also written in PCAP format which can be viewed with Wireshark.

近期下载者

相关文件


收藏者