MITMPROXY

From mywiki
Revision as of 19:21, 30 April 2023 by Johnny (talk | contribs) (Protected "MITMPROXY": Protect short page ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite)))
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search


Threads Involved: Location Spoofing, Client replay (Date:Thu 16 Jan 2020 09:18:44 -0500)


From jwmywiki@cox.net
To Johnny
Date Thu 28 Nov 2019 15:19:40-0500
Headline GitHub - mitmproxy/mitmproxy: An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
Source Net

An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.

Analysis:

  1. Using mitmdump gather as many client location mappings as possible
  2. User central server to randomly replay client mappings.
  3. Provide a way to proxy mobile cellular client.

MITMPROXY to allow me to trace my location data from my phone.

Installing on LAN Web References https://johnnywunder.info/mywiki/index.php/MITMPROXY



Lessons Learned

  1. mitmproxy overwrites file every time it starts need unique file names based on start time to preserve content.
  2. mitmproxy stores files in binary use grep -a