-
Notifications
You must be signed in to change notification settings - Fork 83
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
"issue" - https? #2
Comments
Mitmproxy has an SSLstrip example. I haven't tried it but it certainty seems like it might work. You'd need to be sure to apply new proxy rules to forward all traffic on port
To view traffic interactively, replace |
Ah, I think I miss-read your question. Was that a feature request? If so yes I'm interested in doing that. I've actually been working on a new "attack mode" that spawns a convincing xfinity captive portal and prompts the user to "download this certificate to securely get online." That certificate is of course the mitmproxy cert which would allow you to actually intercept all https traffic that isn't using certificate pinning. Hoping to add that soon, and I'll consider also adding ssl strip when I do. |
I remember the question I had now. Your |
@samatt, great question! This tool is intended to be used primarily as a transparent proxy tool, where the target is made completely unaware of its use against them. If I enabled forwarding of port 443, and the target machine didn't have the mitmproxy cert installed on the machine (which would no doubt be the case if the tool were used in the wild), then any modern browser would through a big scary "You are being MITM'd" message for any HTTPS site. For my personal work, targeting my own devices, I actually do add an iptables entry to forward traffic on 443 because I have access to my devices in order to install the mitmproxy cert. But I didn't want that to be the default behavior for mitm-router in general, because I wanted it be as transparent to the victim's devices as possible out-of-the-box. Make sense (or am I overlooking something)? I'm actually hoping to add a feature to this repo at some point in the next coming weeks that provides a captive portal to a counterfeit XFINITYWIFI login page that prompts a user to download and install the mitmproxy certificate on their device. Replacing the the user/password form with a "Download the secure Xfinity certificate in order to browse the web safely" message. More on that soon 😸... |
"soon" |
damn so did you do this, or |
can you add sslstrip in this?
The text was updated successfully, but these errors were encountered: