MITMPROXY: Difference between revisions

From mywiki
Jump to navigation Jump to search
(Created page with "{{Header |Thread=Location Spoofing, Client replay (Date:Thu 16 Jan 2020 09:18:44 -0500) |Short Description=An interactive TLS-capable intercepting HTTP proxy for penetration t...")
 
m (Protected "MITMPROXY": Protect short page ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite)))
 
(No difference)

Latest revision as of 19:21, 30 April 2023


Threads Involved: Location Spoofing, Client replay (Date:Thu 16 Jan 2020 09:18:44 -0500)


From jwmywiki@cox.net
To Johnny
Date Thu 28 Nov 2019 15:19:40-0500
Headline GitHub - mitmproxy/mitmproxy: An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
Source Net

An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.

Analysis:

  1. Using mitmdump gather as many client location mappings as possible
  2. User central server to randomly replay client mappings.
  3. Provide a way to proxy mobile cellular client.

MITMPROXY to allow me to trace my location data from my phone.

Installing on LAN Web References https://johnnywunder.info/mywiki/index.php/MITMPROXY



Lessons Learned

  1. mitmproxy overwrites file every time it starts need unique file names based on start time to preserve content.
  2. mitmproxy stores files in binary use grep -a