Changes

Jump to: navigation, search

Socat

845 bytes added, 02:40, 4 January 2019
no edit summary
Socat is a commandline network tool akin to [[w:netcat|netcat]]. It supports SSL, IPv6 and several more protocols. It can come in handy when attempting to sniff traffic that has to speak SSL because setting up a cleartext to SSL proxy is relatively straightforward. =TCP to STDIN=To create a classic TCP listening daemon, similar to <!code>netcat -l</code>, use a variation of the following command.<pre>$ socat TCP-LISTEN:8080 stdout</pre> =Cleartext to SSL Tunnel for DyKnow=One can create a plaintext to SSL proxy with socat, useful for performing a man-in-the- The rest middle attack to study network traffic when there is an SSL-only server, but the client application has a vanilla TCP mode available. To do so, use a variant of this page uses a template from the Uniluug project; please see httpsfollowing command, originally used to look at [[DyKnow]]'s traffic to [[gp:Virginia Tech|Virginia Tech]] servers.<pre>$ socat tcp4-listen:1337,fork openssl:dyknow.lt.vt.edu:443,cafile=/etc/uniluug.orgssl/wikicerts/Template:Socat if you wish to edit itGlobalSign_Root_CA. --pem</pre>{{raw[[Category:uSoftware]][[Category:Socat}}Howtos]]

Navigation menu