Mallory is a transparent TCP and UDP proxy. It can be used to get at those hard to intercept network streams, assess those tricky mobile web applications, or maybe just pull a prank on your friend.
In more technical terms, Mallory is an extensible TCP/UDP man in the middle proxy that is designed to be run as a gateway.
The goal is to man in the middle traffic for testing purposes. The ideal setup for Mallory is to have a “LAN” or “Victim” network that Mallory acts as the gateway for. This can be configured within a virtal machine environment using host only network interfaces. The victim virtual machines then configures the Mallory machine as the gateway by manually setting its gateway. The gateway machine will have at least one WAN interface that grants Internet access. The victim network then uses the Mallory gateway to route traffic.
- ca – certificate authority files including Mallory’s private key
- certs – MiTM certs that are created on the fly
- db – directory where mallory stores all database files
- mallory – empty directory
- src – where the code lives
- scripts – scripts used to configure mallory enviorment
- BH2010 Powerpoint Presentation
- BlackHat Presentation Video
- Setup Tutorial: Mallory and Me – Setting Up a Mobile Mallory Gateway
You can download Mallory here:
Or read more here.
- Radare – The Reverse Engineering Framework
- ZMap – Fast Open-Source Network Scanner
- Arachni v1.0 Released – Web Application Security Scanner Framework
- Hacking with Ramzi
- The greatest virus of all time
- Darknet Videos
Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,875,266 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,069,947 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 627,435 views