![]() ![]() echo 'show pools' sudo -u haproxy socat stdio unix-connect:/var/run/haproxy/admin.sock Dumping pools usage. ![]() sudo apt-get install expect socat rlwrap One-shot mode This is the simplest mode of operation, which is especially well suited for shell scripts. ![]() That traffic is aimed at a remote address, so Linux would attempt to route it) and get the socat array of processes piping the traffic through the assembly line of hacking through towards the remote host as intended by the application. Install socat to interact with stats socket and rlwrap, expect to use interactive mode. Supposed you want to modify traffic coming from an application running on a Windows workstation that connects to a hard coded IP address over SSL on a hard coded port.Ī possible solution is to add a static route into a Linux virtual machine connected to the Internet via a bridged interface, setup iptables to hijack the traffic and forward to a local port (remember GOTO :End Case 5: Transparent hijacking of traffic into a socat endpoint Modifying the workstation’s ‘hosts’ file is a helpful tweak to help forward traffic from applications that use hard coded host names rather than IP addresses. Socat #2 in turn forwards the modified traffic via an SSL connection to the remote server. socat #1 pipes the traffic in plain text through netsed (#2) which modifies content on the fly and forwards it to a second instance of socat #2. The application connects to socat #1 on port 6000 over SSL. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |