The purpose of this code is to extract TLS keys from a running OVRServer_x64.exe
, that sends some data to the mothership over TLS.
For details, please read the accompanying post
Note: this codebase is only intended for experimentation and documentation of reverse engineering. Using this code may cause system instability and crash your Oculus Runtime.
cargo build --release
- Copy the binaries from
target/release
directory.
If you want to rebuild ssl_inspector.lib
, run cargo build --features=build-ssl-lib --release
.
To use injector.exe
as a debugger for OVRServer_x64.exe
, you can use gflags
or regedit
.
injector.exe
expects path to OVRServer_x64.exe
as its first argument, the rest of the arguments will be passed through to OVRServer_x64.exe
.
By default, injectee.dll
will log TLS keys into ssl_keylog.txt
near its own location.
To override secret key log location, set system environment variable SSLKEYLOGFILE
.
Keylog format is expected to be compatible with NSS Keylog Format.
This project is distributed under MIT License.
Part of this project uses OpenSSL header files, OpenSSL license located at: openssl-LICENSE