IPC Eavesdropping
IPC Eavesdropping
- Subject: IPC Eavesdropping
- From: Matthew Cox <email@hidden>
- Date: Sat, 15 Nov 2003 15:19:31 -0500
I'm trying to eavesdrop on chatter between a program and a daemon. Both
of these programs are processes belonging to my user, so its not an
attempt to bypass security mechanisms. Specifically, I'm trying to
decode the communication between Microsoft's MSN Messenger application
and its daemon. I've written a simple man in the middle application
that monitors and logs launch arguments and communication on the stdio
channels.
The daemon is being launch with the following arguments:
"/Applications/dMSN Messenger.app/Contents/SharedSupport/MSN Messenger
Daemon",
"-psn_0_2621441"
The second argument is variable, but always of the form
"-psn_0_<seven-digit-decimal-integer>" My instinct is telling me that
this is probably a mach port address for IPC, but I might be wrong.
Does anyone have any idea what this represents, and how I can an
intercept it?
Matthew
PS: My man in the middle works by being launched by the MSN Messenger
application. It then launches the real daemon, and passes it the same
arguments it received. Finally, it sends what it receives on its stdin
to the daemon's stdin over a pipe, and similarly for stdout and stderr.
Amazing what you can do with Foundation and 200 lines of Objective-C,
isn't it?
_______________________________________________
cocoa-dev mailing list | email@hidden
Help/Unsubscribe/Archives:
http://www.lists.apple.com/mailman/listinfo/cocoa-dev
Do not post admin requests to the list. They will be ignored.