Automatically Launch and debug an executable, specifically targeting the UnsealMessage function in sspicli.dll to monitor TLS protocol buffer data recieved from a server, and includes a manual DLL mapper to inject custom Dll into the target process.
- Process Debugging: Launches and attaches to any 64-bit executable under the control of the Windows Debug API.
- Targeted Memory Inspection: Sets a breakpoint on
sspicli!UnsealMessageand automatically parses theSecBufferDescandSecBufferstructures to extract and display thepvBufferdata upon execution. - Manual DLL Mapping: by manually mapping a 64-bit DLL into the target process's address space, bypassing standard
LoadLibrarycalls. - Cmake Script: Includes a
.cmakescript to automatically build and generate hex bytes from the dll and include them via header file in the project before it builds.
-
Clone the repository
git clone https://github.com/W4ZM/TLSReveal.git -
Build
cd TLSReveal\ mkdir build\ && cd build\ cmake .. cmake --build . --config Release
Change the #define EXE_NAME "target.exe" in src\main.cpp to the name of target executable.
Launch The Loader.exe in the same folder with the target exe.
video