Skip to content

rdesktop/rdpproxy

Repository files navigation

=======================================
rdpproxy: Man-in-the-middle RDP sniffer
	Matt Chapman <[email protected]>
	Modified by Erik Forsberg <forsberg at cendio dot se>


NOTE: This is a tool for developers, so it is a bit rough around the
edges :)

RDP4
----
Old Microsoft RDP4 clients should work "out of the box". Although with
this version of rdpproxy, they don't. Umm.. don't know why.

RDP5, Administration mode
-------------------------
You will need to replace tsprivkey.der with the private key from your
Terminal Server.  To do this, dump its secrets with Todd Sabin's
lsadump2 (sold separately).  Then pass the output of lsadump2 through
extractkey.pl (just dumps that particular secret in binary) and finally
rsa2der.

RDP5, Application mode
----------------------
This works as it should as far as I can see. 


=======================================
pparser.py: Parser for turning rdpproxy output into readable form.
	Erik Forsberg <forsberg at cendio dot se>
	
pparser.py can be used to get a more readable form of the packet trace
output by rdpproxy. Just as rdpproxy, it's a developer tool, so it's
usability may sometimes be.. uhm.. challenging :-).

pparser.py can output several formats, but basically, only the TXT
format is interesting unless you write a master thesis :-).

pparser.py can sort out packets based on what channel they occur on,
so it might very well be useful for developing support for new virtual
channels such as sound and local drive redirection.

In order to work, pparser.py expects the directory keymaps to exist in
the current directory. It makes most sense to create a symlink to the
keymaps directory in the rdesktop source directory.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages