<div dir="ltr"><div dir="ltr">On Mon, Feb 4, 2019 at 5:38 PM Daniel-Constantin Mierla <<a href="mailto:daniel@kamailio.org">daniel@kamailio.org</a>> wrote:<br></div><div class="gmail_quote"><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><u></u><div><div style="font-family:arial,sans-serif;font-size:13px"><br><p>And I would say it a little bit scary on the other hand, so now it easy to attach at runtime to a process and loop execution of some functions through own code just by knowing the name and signature...<br><br></p></div></div></blockquote><div>yep. Kind of mind blowing... In past, you needed to make a wrapper for the lib, then substitute the wrapper to the actual lib...</div><div>OTOH, if you are root...<br><br></div><div>Btw, I don't want to be the owl of bad luck, but... Maybe these techniques will bring mayhem to GDPR compliance, and so on and so on... (scared face)</div><div>-giovanni<br><br></div><div><br></div><div><br></div><div> </div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div><div style="font-family:arial,sans-serif;font-size:13px"><p>Cheers,<br>Daniel<br><br>February 4, 2019 4:01 PM, "Giovanni Maruzzelli" <<a href="mailto:%22Giovanni%20Maruzzelli%22%20%3Cgmaruzz@gmail.com%3E" target="_blank">gmaruzz@gmail.com</a>> wrote:</p> <blockquote><div><div><div dir="ltr"> <pre># How to TRACE and visualize TLS and non-TLS SIP traffic in real time (thanks to Homer's Lorenzo Mangani for pointing me toward Frida) apt-get install python-pip pip install frida pip install hexdump wget <a rel="external nofollow noopener noreferrer" href="https://raw.githubusercontent.com/google/ssl_logger/master/ssl_logger.py" target="_blank">https://raw.githubusercontent.com/google/ssl_logger/master/ssl_logger.py</a> #first ssh terminal # create fifo pipe, then will send the content from fifo pipe to an sngrep without gui, which will be reading pcap from stdin, and sending eep packets to the other sngrep (third terminal) mkfifo /tmp/pipe cat /tmp/pipe | sngrep -N -q -H udp:<a rel="external nofollow noopener noreferrer" href="http://127.0.0.1:5077" target="_blank">127.0.0.1:5077</a> -I - #second ssh terminal # writes as pcap to fifo pipe what freeswitch writes and reads from ssl lib python ssl_logger_giova.py -pcap /tmp/pipe freeswitch #third ssh terminal # sngrep that receives packets from both the Ethernet device, and the eep packets sent by the other sngrep (eg, the tls packets ssl_logger grabs from freeswitch's ssl lib) sngrep -L udp:<a rel="external nofollow noopener noreferrer" href="http://127.0.0.1:5077" target="_blank">127.0.0.1:5077</a> (you may want to edit ssl_logger.py and change 228 to be 101 - LINKTYPE_IPV4 to be LINKTYPE_RAW )</pre> <br clear="all"><br>--<div dir="ltr">Sincerely,<br><br>Giovanni Maruzzelli<br>OpenTelecom.IT<br>cell: +39 347 266 56 18<br> </div> <br> </div></div></div></blockquote> <u></u><br><br>--<br>Daniel-Constantin Mierla<br><a href="http://www.kamailio.org" target="_blank">www.kamailio.org</a> -- <a href="http://www.asipto.com" target="_blank">www.asipto.com</a><u></u> </div></div>
</blockquote></div><br clear="all"><br>-- <br><div dir="ltr" class="gmail_signature" data-smartmail="gmail_signature">Sincerely,<br><br>Giovanni Maruzzelli<br>OpenTelecom.IT<br>cell: +39 347 266 56 18<br><br></div></div>