
Research
PyPI Package Disguised as Instagram Growth Tool Harvests User Credentials
A deceptive PyPI package posing as an Instagram growth tool collects user credentials and sends them to third-party bot services.
MaProxy is a simple TCP proxy based on
Tornado http://www.tornadoweb.org/`_.
Well, maybe not that simple, since it supports:
TCP -> TCP simple reverse proxy. Whatever data goes in , goes out
TCP -> SSL proxy to encrypt incoming data. a.k.a stunnel
SSL -> TCP proxy to decrypt incoming data a.k.a SSL-terminator or SSL-decryptor
SSL- > SSL whatever gets in will be decrypted and then encrypted again
Each SSL can be used with SSL certificates. including client-certificates !!
// update (Aug 2016) // // It seems that google now returning "HTTP 304" (page moved), // Hence,the google examples won't work. // In addition, the examples won't work with sites that check the "HOST" header (since when you connect locally the browser will send HOST: 127.0.0.1)
Let's start with the simplest example - no bells and whistles - a simple TCP proxy::
#!/usr/bin/env python
import tornado.ioloop
import maproxy.proxyserver
# HTTP->HTTP: On your computer, browse to "http://127.0.0.1:81/" and you'll get http://www.google.com
server = maproxy.proxyserver.ProxyServer("www.google.com",80)
server.listen(81)
print("http://127.0.0.1:81 -> http://www.google.com")
tornado.ioloop.IOLoop.instance().start()
We are creating a proxy (reverse proxy, to be more accurate) that listens locally on port 81 (0.0.0.0:81) and redirect all calls to www.google.com (port 80) . Note that:
Now, Let's say that you'd like to listen on a "clear" (non-encrypted) connection but connect to an SSL website, for example - create a proxy http://127.0.0.1:82 -> https://127.0.0.1:443 , simply update the "server" line::
#!/usr/bin/env python
import tornado.ioloop
import maproxy.proxyserver
# HTTP->HTTP: On your computer, browse to "http://127.0.0.1:81/" and you'll get http://www.google.com
server = maproxy.proxyserver.ProxyServer("www.google.com",443,server_ssl_options=True)
server.listen(82)
print("http://127.0.0.1:82 -> https://www.google.com",)
tornado.ioloop.IOLoop.instance().start()
Alternatively, you can listen on SSL port and redirect the connection to a clear-text server. In order to listen on SSL-port, you need to specify SSL server-certificates as "client_ssl_options"::
#!/usr/bin/env python
import tornado.ioloop
import maproxy.proxyserver
# HTTPS->HTTP
ssl_certs={ "certfile": "./certificate.pem",
"keyfile": "./privatekey.pem" }
# "client_ssl_options=ssl_certs" simply means "listen using SSL"
server = maproxy.proxyserver.ProxyServer("www.google.com",80,
client_ssl_options=ssl_certs)
server.listen(83)
print("https://127.0.0.1:83 -> http://www.google.com")
tornado.ioloop.IOLoop.instance().start()
In the "demos" section of the source-code, you will also find:
pip install maproxy
Source Code: https://github.com/zferentz/maproxy
Contact Me: zvika d-o-t ferentz a-t gmail d,o,t com (if you can't figure it out - please don't contact me :) )
FAQs
My first attempt to create a simple and awesome TCP proxy using Tornado
We found that maproxy demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
A deceptive PyPI package posing as an Instagram growth tool collects user credentials and sends them to third-party bot services.
Product
Socket now supports pylock.toml, enabling secure, reproducible Python builds with advanced scanning and full alignment with PEP 751's new standard.
Security News
Research
Socket uncovered two npm packages that register hidden HTTP endpoints to delete all files on command.