Results 1 to 2 of 2

Thread: Matasano PFI (as seen on TV!)

  1. #1

    Matasano PFI (as seen on TV!)

    Do you ever find yourself on a reversing or pen-testing project with the need to peek into a TCP stream and modify a little bit of data?

    Do you find yourself annoyed, feeling that you’ve hacked together code to do this many times before, but simply can’t find it?

    Do you find yourself hobbling together other tools to do what you need? Do you find yourself wishing you had a Burp for raw TCP connections?

    No MORE!¬*Using Matasano’s Port Forwarding Interceptor you have the tool you need right at your fingertips! Lets take a closer look at this exciting new tool shall we?¬*

    Let’s say you are watching your favorite 15 minute ANSI art rendition of Star Wars on telnet://towel.blinkenlights.nl¬*. You think to yourself:

    “Man I sure wish I could get in-between my telnet client and the server and begin reversing this Star Wars protocol”.

    Then you remember you got Matasano’s PFI off of Github earlier today!

    You take a look at the usage and it seems pretty self explanitory…



    So then you decide to try it out by running something like this:



    (This sets up PFI as a TCP port forward listening on the loopback interface on port 23 and forwarding traffic to towel.blinkenlights.nl on port 23, but you knew that already of course, thats why you ran it…)

    You are then greeted by the comforting and familiar PFI GUI windows. And hey, you didn’t even have to install any weird python modules or dependencies!



    You take a minute to notice how simple and self-explanitory it all is. One window displays the intercepted text, and allows you to choose whether to intercept. The other window allows you to edit the intercepted data before it is passed on through the tunnel. How easy! It is like a “Burp” for raw TCP!

    You then decide to try it out by connecting through the tunnel:



    And begin watching your ANSI art show:



    So the tunnel works! You look back at your PFI main window and see that data is in fact passing through PFI.



    You select the “Intercept” check boxes and begin intercepting and editing data across the tunnel.



    And as you begin reversing the complex ANSI Star Wars protocol you cant help but feel yourself awash with gratitude that Matasano PFI saved you the trouble of having to dig out all your old scripts and programs. You give your monitor a thumbs up and say: “Thanks PFI!”

    Then you remember that Matasano Blackbag also had a similar tool (called replug) and then you feel silly, not just about neglecting Blackbag but also that you gave your monitor a thumbs up.



    http://www.matasano.com/log/1693/matasano-pfi-as-seen-on-tv/

  2. #2
    Administrator dELTA's Avatar
    Join Date
    Oct 2000
    Location
    Ring -1
    Posts
    4,206
    Blog Entries
    5
    "Give a man a quote from the FAQ, and he'll ignore it. Print the FAQ, shove it up his ass, kick him in the balls, DDoS his ass and kick/ban him, and the point usually gets through eventually."

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •