[ad] It seems finally someone has found a flaw in the way Tor works, a way to beat it and find out who is using the system. Perhaps an end to the most anonymous system on the Internet? I got this info fresh from SANS. One of our readers sent in a very worrying analysis […]
proxy
Odysseus Proxy for MITM Attacks Testing Security of Web Applications.
Odysseus is a proxy server, which acts as a man-in-the-middle during an HTTP session. A typical HTTP proxy will relay packets to and from a client browser and a web server. Odysseus will intercept an HTTP session’s data in either direction and give the user the ability to alter the data before transmission. For example, […]
Echo Mirage – A Generic Network Proxy
Echo Mirage is a generic network proxy. It uses DLL injection and function hooking to redirect network related function calls so that data transmitted and received by local applications can be observed and modified. Think of it as Odysseus (or Burp, if you prefer) that will proxy (almost) anything… Windows encryption and OpenSSL functions are […]
Paros Proxy 3.2.12 Released – MITM HTTP and HTTPS Proxy
[ad] Paros 3.2.12 is released. This version is a maintenance release which fix a potental 100% cpu consumption issue. All users are recommended to upgrade to this version. The changes are: – Use newest external library for HTTP handling. – Enable/disable spider to POST forms in options panel to avoid generating unwanted traffic (default to […]
Anonymity – Hiding Your Identity in 2006
Introduction Anonymity is derived from the greek word ἀνωνυμία (anonymia), meaning without a name or name-less. In colloquial use, the term typically refers to a person, and often means that the Ppersonal identity, or personally identifiable information of that person is not known. The main question is of course, what are you trying to hide? […]