Nice compilation bro. Those materials are enough already for someone who plan to develop their own proxy.Quote:
[Only registered and activated users can see links. Click Here To Register...]
Has some links to info on encryption. I generally just use public encryption methods for both as they 'work' perfectly fine in C#.
If you want to write your own though there is a bunch of info on the dhkey/man in the middle attack and also a nice bit of example code for blowfish on korv's wiki. All this is already linked in the proxy thread though.
[Only registered and activated users can see links. Click Here To Register...]
Diffie?Hellman key exchange - Wikipedia, the free encyclopedia
Man-in-the-middle attack - Wikipedia, the free encyclopedia
Also points for you for actually being willing to put work into LEARNING. I'm shocked. 99 pct of the posts around here has been "omg how do I make proxy?!?" and then as soon as they run into an obstacle they give up and ask for a working one to use/leach/etc.
Why not go for memory based proxy now? I mean you've done enough already for the packet based and I think its time for you to explore the memory based. Well me I was stacked on the hooking part, I don't know the basic though I'm still studying the basic of it. Hope you share also these memory stuff once u made it. :).