[Question] Proxy - deciphering server key packet

11/27/2010 14:10 gorgone#46
yeap password error :) or wrong password i tried Send anyway is hard to make a proxy but is so funny

i m try to make a loopback microsoft and sniffing

T.Listen(myipaddress,"69.59.181.180", 5816)

on this ports ^.^'' where T is a surrogate on loopback microsoft ethernet
11/27/2010 17:25 Kiyono#47
You guys should instead of trying to bruteforce the password actually read what pro says cause he's referring to his own thread which contains the same file but without a password.
11/27/2010 21:32 gorgone#48
lol ... no i don t used bruteforce :) i m just curious, anyway i ware in [Only registered and activated users can see links. Click Here To Register...]

and watched the code thx
11/30/2010 18:20 shitboi#49
hmmm... What is the common length in byte[] for client-proxy shared key?

I can generate a sharedkey between client and proxy but the key is always a 64 element byte array, which is too long for blowfish cipher (448bits max)

So i am guessing i did something wrong with the keys. Funny enough, i am certain that i have created the correct proxy DH packet, because client has sent the proxy a time packet right after the client DH reply.

Enlightenments please.