I hereby claim:
- I am mhils on github.
- I am mhils (https://keybase.io/mhils) on keybase.
- I have a public key whose fingerprint is 2A8E 7851 3CA7 9C34 B694 7897 FF0A 0917 D3AE 1418
To claim this, I am signing this object:
['libmproxy', 'libmproxy.contrib', 'libmproxy.contrib.jsbeautifier', 'libmproxy.contrib.jsbeautifier.unpackers', 'libmproxy.console', 'libmproxy.platform'] | |
{'libmproxy': ['static/bootstrap.min.js', 'static/jquery-1.10.1.min.js', 'static/jquery.localscroll-min.js', 'static/bootstrap.min.css', 'static/jquery.scrollTo-min.js', 'static/mitmproxy.css', 'static/fontawesome/fonts/FontAwesome.otf', 'static/fontawesome/fonts/fontawesome-webfont.svg', 'static/fontawesome/fonts/fontawesome-webfont.woff', 'static/fontawesome/fonts/fontawesome-webfont.eot', 'static/fontawesome/fonts/fontawesome-webfont.ttf', 'static/fontawesome/css/font-awesome.min.css', 'static/fontawesome/css/font-awesome.css', 'templates/layout.html', 'templates/certs.html', 'templates/frame.html', 'templates/index.html']} | |
running install | |
running build | |
running build_py | |
running build_scripts | |
running install_lib | |
running install_scripts | |
changing mode of /usr/local/bin/mitmproxy to 755 | |
changing mode of /usr/local/bin/mitmdump to 755 |
C:\Python27\python.exe C:/Users/user/git/mitmproxy/mitmdump -v --cert ca/full.pem | |
127.0.0.1:57397: clientconnect | |
127.0.0.1:57397: request | |
-> CONNECT example.com:443 HTTP/1.1 | |
127.0.0.1:57397: Set new server address: example.com:443 | |
127.0.0.1:57397: serverconnect | |
-> example.com:443 | |
127.0.0.1:57397: Received CONNECT request to SSL port. Upgrading to SSL... | |
127.0.0.1:57397: Establish SSL | |
-> with client |
C:\Python27\python.exe C:/Users/user/git/mitmproxy/mitmdump -v --cert ca/full.pem | |
127.0.0.1:61508: clientconnect | |
127.0.0.1:61508: request | |
-> CONNECT example.com:443 HTTP/1.1 | |
127.0.0.1:61508: Set new server address: example.com:443 | |
127.0.0.1:61508: serverconnect | |
-> example.com:443 | |
127.0.0.1:61508: Received CONNECT request to SSL port. Upgrading to SSL... | |
127.0.0.1:61508: Establish SSL | |
-> with client |
You currently suggest the following iptables rules: | |
# iptables -A PREROUTING -s {SOURCE} -p tcp -m tcp --dport 80 -j | |
REDIRECT --to-ports 8080 | |
In order to utilize fully transparent mode, you also need: | |
# iptables -t mangle -N DIVERT | |
# iptables -t mangle -A PREROUTING -p tcp -m socket -j DIVERT | |
# ip tables -t mangle -A DIVERT -j MARK --set-mark 0x2/0x2 # your mark may vary | |
# iptables -t mangle -A DIVERT -j ACCEPT |
def request(context, flow): | |
flow.request.host = flow.request.pretty_host(hostheader=True) |
def test_renegotiate(self): | |
""" | |
If :py:obj:`Connection.recv` is called during renegotation, | |
it will block until renegotation is complete and the message has been read. | |
(OpenSSL's SSL_MODE_AUTO_RETRY is turned on by default) | |
""" | |
# Do not use _server() or _client(): | |
# https://www.openssl.org/docs/ssl/SSL_CTX_set_session_id_context.html | |
# If the session id context is not set on an SSL/TLS server and client certificates are used, |
import socket | |
from libmproxy.script import concurrent | |
from libmproxy.protocol.http import decoded | |
cache = dict() | |
def has_ssl(host): | |
if not host in cache: | |
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) | |
try: | |
s.connect((host, 443)) |
I hereby claim:
To claim this, I am signing this object:
import uuid | |
from pprint import pprint | |
import click | |
from libmproxy import tnetstring | |
@click.group() | |
def cli(): | |
"""mitmproxy dumpfile utilities""" |
9861d7596d3dae02befaddedada43721 |