
Originally Posted by
Brandon
Lol.. Poker-stars is an exe. Not a Jar file.
Backtrack + SSLStrip + ARPPoision > SSL.
However, the packets for poker-stars might still be compressed using LZHL (according to google) in the first place so even if you break the SSL encryption, you still have to decompress each packet or vice-versa (Decompress before decrypting).
Also you don't need any proxies to trap a connection.. You only need proxies or wireshark if you actually want to listen to the communication between the actual server and the client. If you want to see what the client is trying to do, just utilize your hosts file and trap it that way. Redirect it to 127.0.0.1:80 or w/e port number and address you want.. Then write a simple socket listener that listens on that port acting as the server. Open your poker stars and all outgoing information goes straight to your local host and that port where your listener should already be listening..
Do w/e with the info you grabbed..
This is essentially the very basics of starting to write a server emulator which you might end up writing (partially).. You'll have to figure out what each packet's OP code is after you break the encryption and decompress (if it is compressed still). The plaintext would help with that.
Yes its a 8MB exe file. Who said it was .jar? I already created a program to listen to the localhost, here's a piece of the code. It works perfect for the updates.
Simba Code:
Procedure Thread(id: Integer);
var
Size, num, HTTP: Integer;
update, host, port, data, head, page: String;
Process: TStringArray;
begin
HTTP := InitializeHTTPClient(false);
data := RecvSocket(id);
Process := Explode (' ', data);
writeln ('=============================================');
writeln (Process[1]);
writeln ('---------------------------------------------');
update := GetHTTPPage (HTTP, Process[1]);
update := GetRawHeaders(HTTP) + update;
Sendsocket(id, update);
writeln (data);
CloseSocket (id);
FreeSocket (id);
end;