A library/app for intercepting/sniffing TCP requests, modifying headers and responses.
To Install RServer, Please use the following command :
shell
cargo install rserver
How to use the RServer to intercept/sniff TCP requests.
Let us consider that we want to run RServer at localhost address "127.0.0.1" and port 80. To run RServer, use the folowing command :
shell
rserver 127.0.0.1 80
Please set the browser/system proxy as host 127.0.0.1 and port 80 to use Rserver for intercepting all requests.
If you directly want to test RServer installation without doing the above step, please open this URL in Web Browser : http://127.0.0.1/ and you should see HTTP Headers sent by the Browser in that page.
```rust use rserver;
fn main() { let (serverhost, serverport) = ("127.0.0.1", 80); rserver::startserver(serverhost, server_port); }
```
How to read the stream data and return stream data & its length.
```rust
/// Read the stream data and return stream data & its length
fn readstream(stream: &mut TcpStream) -> (Vec
if n == 0 {
break;
} else {
request_len += n;
// we need not read more data in case we have read less data than buffer size
if n < buffer_size {
// let us only append the data how much we have read rather than complete existing buffer data
// as n is less than buffer size
request_buffer.append(&mut buffer[..n].to_vec()); // convert slice into vec
break;
} else {
// append complete buffer vec data into request_buffer vec as n == buffer_size
request_buffer.append(&mut buffer);
}
}
}
Err(e) => {
println!("Error in reading stream data: {:?}", e);
break;
}
}
}
(request_buffer, request_len)
}
```
Note : Currently : Connection to online hosts are working fine with GET requests only. CONNECT requests respose reading has some issue that needs to be fixed.
To-Do