如何在Windows XP中转发进程的TCP/IP流量?
替代文本 http://img440.imageshack.us/img440/6950/problemyd1.png< /a>
(带点的卷线代表网络路由。)
有一个名为“foo.exe”的进程,是否有办法将其通过 TCP/IP 通信的所有内容转发到位于其他位置的转发代理? 此转发不应反映到其他进程。
另一个问题:如果有多个网络适配器,是否可以强制一个进程使用一个特定的适配器。
由于在此示例中 targethost.com 是已知的,因此我只需编辑“system32\drivers\etc\hosts”即可将 targethost.com 的 IP 映射到本地主机,其中端口 8765 将是第一个等待传入连接并传递所有内容的转发器转发到 proxy.foo.com。 我想知道是否有更优雅的方法来做到这一点。
这不是针对恶意软件的,我正在使用我复杂的家庭网络进行一些网络测试。 感谢您警告我们。
一些免费软件将是完美的,或者是代码想法(本机或.net)。 非常感谢。
alt text http://img440.imageshack.us/img440/6950/problemyd1.png
(The curly lines with dots represent a network route.)
Having a process called "foo.exe", is there a way to forward everything it communicates over TCP/IP to a forwarding proxy located elsewhere? This forwarding should not reflect to other processes.
Another question: if there are multiple network adapters, is it possible to force a process to use one specific adapter.
Since in this example the targethost.com is known, I could just edit "system32\drivers\etc\hosts" to map targethost.com's IP to localhost, where on port 8765 would be the first forwarder waiting for an incoming connection and pass everything forward to proxy.foo.com. I was wondering if there's a more elegant way of doing this.
This is not for malware, I'm doing some network testing with my complex home network. Thank you for warning us.
Some free software for this would be perfect, alternatively a code idea (native or .net). Thank you very much.
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

如果您将自己的计算机设置为防火墙,然后您的应用程序连接到您自己计算机上的端口,并且该端口将转发到原始目的地并登录或转发到您的间谍计算机,那么这并不太难。
或者,您可以将另一台计算机设置为防火墙并让它记录/转发信息。
最后你可以使用嗅探器。
It's not too hard if you make your own computer a firewall, then your app connects to a port on your own computer, and that port is forwarded to both the original destination and logged or forwarded on to your spying computer.
Alternatively you can make your other computer the firwall and have it log/forward the info.
Finally you could use a sniffer.