如何拦截/嗅探特定应用程序的所有 tcp/udp 网络流量?
基本上,我想知道如何拦截/嗅探某些特定应用程序(例如隧道应用程序)的所有 tcp/udp 网络流量?例如,ProxyCap 允许将特定应用程序的所有流量通过隧道传输到某个代理。据我所知,这些程序可以在更改/重新路由之前拦截所有流量。
我尝试过使用 winpcap,甚至尝试过 Wireshark。但如果你安装了 proxycap,它就不起作用了。我的意思是,它不会捕获应用程序流量:
- ProxyCap 拦截的来自我的程序的流量
- 将其全部重定向到本地主机代理
- 我的本地主机代理实际上是一个 Your-Freedom 网关代理
- Your-freedom 代理将流量发送到他们的服务器(流量发送到互联网) )。
当我开始 Wireshark 嗅探(基于 winpcap 驱动程序)时,我只看到来自步骤 #4 的流量(当它进入互联网时)。而且这个流量不是原始的(它是打包/编码的),所以我无法嗅探它。
因此,由于我需要嗅探所有流量,我认为我要么找到一种在 ProxyCap 之前嗅探的方法(或在其之后,但我认为这是不可能的,因为流量重定向到环回代理)。
我想问你们 - 有没有办法像 ProxyCap(或其他隧道应用程序)那样拦截/嗅探流量?
Basically, I want to know how can I intercept/sniff all tcp/udp network traffic for some specific application like the tunneling applications do? For example ProxyCap allows to tunnel all traffic for specific application to some proxy. So as I can understand those programs can intercept all traffic before they change/reroute it.
I've tried using winpcap but even Wireshark. But it doesn't work if you have proxycap installed. I mean, it does not capture application traffic:
- Traffic from my program intercepted by the ProxyCap
- ProxyCap redirects it all to localhost proxy
- My localhost proxy is actually a Your-Freedom gateway proxy
- Your-freedom proxy sends traffic to their servers (traffic goes to internet).
When I start Wireshark sniffing (which is based on winpcap driver) I see only traffic from step #4 (when it goes to the internet). And this traffic is not raw (it's packed/encoded) so it doesn't work for me to sniff it.
So since I need to sniff all the traffic I thought that I either find a way to sniff before ProxyCap (or after it, but I don't think it's possible since traffic redirected to the loopback proxy).
I want to ask you guys - is there a way to intercept/sniff traffic like ProxyCap (or other tunneling applications) do?
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论