mitmproxy安装的正确姿势
本文以windows为准(windows7、windows8),红色字体部分非常关键
第一步、windows下载mitmproxy并安装,我选择的是较低的4.0版本;
第二步、iPhone和Android手机安装证书;
这一步很关键,网上有很多是错误的;
1) 在电脑上找到证书文件(而不是访问 mitm.it 下载),证书文件一般在这个目录下 C:\Users\Administrator\.mitmproxy\ ,文件名是 mitmproxy-ca-cert.pem ;
2) 把 上面的 证书文件发送到手机端口,正确的发送方式是,发到有126 或者 163 邮箱,然后用 手机自带浏览器下载(注意,QQ邮箱在iPhone的浏览器无法正常下载,所以不能用QQ邮箱);
3) 在手机上安装证书,我用的是ios15.1版,iPhone 还需要在 “设置”→“通用”→“关于本机”→“证书信任设置” 将 mitmproxy 的完全信任开关打开;
第三步、正确启动 mitmdump,打开cmd,命令行输入如下命令:
mitmdump -s tls_passthrough.py
如果没有参数 -s tls_passthrough.py, 手机访问不了https的网址,很多app也无法链接网络;
tls_passthrough.py 文件内容如下:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 | """ This inline script allows conditional TLS Interception based on a user-defined strategy. Example: > mitmdump -s tls_passthrough.py 1. curl --proxy http://localhost:8080 https://example.com --insecure // works - we'll also see the contents in mitmproxy 2. curl --proxy http://localhost:8080 https://example.com --insecure // still works - we'll also see the contents in mitmproxy 3. curl --proxy http://localhost:8080 https://example.com // fails with a certificate error, which we will also see in mitmproxy 4. curl --proxy http://localhost:8080 https://example.com // works again, but mitmproxy does not intercept and we do *not* see the contents Authors: Maximilian Hils, Matthew Tuusberg """ import collections import random from enum import Enum import mitmproxy from mitmproxy import ctx from mitmproxy.exceptions import TlsProtocolException from mitmproxy.proxy.protocol import TlsLayer, RawTCPLayer class InterceptionResult(Enum): success = True failure = False skipped = None class _TlsStrategy: """ Abstract base class for interception strategies. """ def __init__( self ): # A server_address -> interception results mapping self .history = collections.defaultdict( lambda : collections.deque(maxlen = 200 )) def should_intercept( self , server_address): """ Returns: True, if we should attempt to intercept the connection. False, if we want to employ pass-through instead. """ raise NotImplementedError() def record_success( self , server_address): self .history[server_address].append(InterceptionResult.success) def record_failure( self , server_address): self .history[server_address].append(InterceptionResult.failure) def record_skipped( self , server_address): self .history[server_address].append(InterceptionResult.skipped) class ConservativeStrategy(_TlsStrategy): """ Conservative Interception Strategy - only intercept if there haven't been any failed attempts in the history. """ def should_intercept( self , server_address): if InterceptionResult.failure in self .history[server_address]: return False return True class ProbabilisticStrategy(_TlsStrategy): """ Fixed probability that we intercept a given connection. """ def __init__( self , p): self .p = p super (ProbabilisticStrategy, self ).__init__() def should_intercept( self , server_address): return random.uniform( 0 , 1 ) < self .p class TlsFeedback(TlsLayer): """ Monkey-patch _establish_tls_with_client to get feedback if TLS could be established successfully on the client connection (which may fail due to cert pinning). """ def _establish_tls_with_client( self ): server_address = self .server_conn.address try : super (TlsFeedback, self )._establish_tls_with_client() except TlsProtocolException as e: tls_strategy.record_failure(server_address) raise e else : tls_strategy.record_success(server_address) # inline script hooks below. tls_strategy = None def load(l): l.add_option( "tlsstrat" , int , 0 , "TLS passthrough strategy (0-100)" , ) def configure(updated): global tls_strategy if ctx.options.tlsstrat > 0 : tls_strategy = ProbabilisticStrategy( float (ctx.options.tlsstrat) / 100.0 ) else : tls_strategy = ConservativeStrategy() def next_layer(next_layer): """ This hook does the actual magic - if the next layer is planned to be a TLS layer, we check if we want to enter pass-through mode instead. """ if isinstance (next_layer, TlsLayer) and next_layer._client_tls: server_address = next_layer.server_conn.address if tls_strategy.should_intercept(server_address): # We try to intercept. # Monkey-Patch the layer to get feedback from the TLSLayer if interception worked. next_layer.__class__ = TlsFeedback else : # We don't intercept - reply with a pass-through layer and add a "skipped" entry. mitmproxy.ctx.log( "TLS passthrough for %s" % repr (next_layer.server_conn.address), "info" ) next_layer_replacement = RawTCPLayer(next_layer.ctx, ignore = True ) next_layer.reply.send(next_layer_replacement) tls_strategy.record_skipped(server_address) # 所有发出的请求数据包都会被这个方法所处理 # 所谓的处理,我们这里只是打印一下一些项;当然可以修改这些项的值直接给这些项赋值即可 def request(flow): print (flow.request.host) # 所有服务器响应的数据包都会被这个方法处理 # 所谓的处理,我们这里只是打印一下一些项 def response(flow): print ( "len:" + str ( len (flow.response.text))) |
【推荐】国内首个AI IDE,深度理解中文开发场景,立即下载体验Trae
【推荐】编程新体验,更懂你的AI,立即体验豆包MarsCode编程助手
【推荐】抖音旗下AI助手豆包,你的智能百科全书,全免费不限次数
【推荐】轻量又高性能的 SSH 工具 IShell:AI 加持,快人一步
· 周边上新:园子的第一款马克杯温暖上架
· Open-Sora 2.0 重磅开源!
· .NET周刊【3月第1期 2025-03-02】
· 分享 3 个 .NET 开源的文件压缩处理库,助力快速实现文件压缩解压功能!
· [AI/GPT/综述] AI Agent的设计模式综述