diff options
Diffstat (limited to 'docs/src/content')
-rw-r--r-- | docs/src/content/concepts-certificates.md | 2 | ||||
-rw-r--r-- | docs/src/content/concepts-filters.md | 5 | ||||
-rw-r--r-- | docs/src/content/concepts-protocols.md | 4 | ||||
-rw-r--r-- | docs/src/content/overview-features.md | 4 | ||||
-rw-r--r-- | docs/src/content/tools-mitmdump.md | 4 | ||||
-rw-r--r-- | docs/src/content/tute-clientreplay.md | 7 |
6 files changed, 16 insertions, 10 deletions
diff --git a/docs/src/content/concepts-certificates.md b/docs/src/content/concepts-certificates.md index 4e2ae47a..4e9aa652 100644 --- a/docs/src/content/concepts-certificates.md +++ b/docs/src/content/concepts-certificates.md @@ -48,7 +48,7 @@ documentation for some common platforms. The mitmproxy CA cert is located in - [Windows (automated)](https://technet.microsoft.com/en-us/library/cc732443.aspx) {{< highlight bash >}} -certutil.exe -importpfx Root mitmproxy-ca-cert.p12 +certutil -addstore root mitmproxy-ca-cert.cer {{< / highlight >}} - [Mac OS X](https://support.apple.com/kb/PH20129) diff --git a/docs/src/content/concepts-filters.md b/docs/src/content/concepts-filters.md index f0b9a4b2..b9c89456 100644 --- a/docs/src/content/concepts-filters.md +++ b/docs/src/content/concepts-filters.md @@ -49,3 +49,8 @@ Requests whose body contains the string "test": Anything but requests with a text/html content type: !(~q & ~t "text/html") + +Replace entire GET string in a request (quotes required to make it work): + + ":~q ~m GET:.*:/replacement.html" + diff --git a/docs/src/content/concepts-protocols.md b/docs/src/content/concepts-protocols.md index c79274bf..dc9d84fb 100644 --- a/docs/src/content/concepts-protocols.md +++ b/docs/src/content/concepts-protocols.md @@ -73,6 +73,8 @@ If an endpoint sends a PING to mitmproxy, a PONG will be sent back immediately PING (without a payload) is sent to the other endpoint. Unsolicited PONG's are not forwarded. All PING's and PONG's are logged (with payload if present). +Please note that message interception, modification or replay are not possible yet. + ## Raw TCP / TCP Proxy / Fallback In case mitmproxy does not handle a specific protocol, you can exempt @@ -83,7 +85,7 @@ but differs in two important aspects: * The raw TCP messages are printed to the event log. * SSL connections will be intercepted. -Please note that message interception or modification are not possible yet. If +Please note that message interception, modification or replay are not possible yet. If you are not interested in the raw TCP messages, you should use the ignore domains feature. diff --git a/docs/src/content/overview-features.md b/docs/src/content/overview-features.md index 9a4c5468..cf935adb 100644 --- a/docs/src/content/overview-features.md +++ b/docs/src/content/overview-features.md @@ -82,7 +82,7 @@ Replace `foo` with `bar` in requests: :~q:foo:bar {{< / highlight >}} -Replace `foo` with with the data read from `~/xss-exploit`: +Replace `foo` with the data read from `~/xss-exploit`: {{< highlight bash >}} mitmdump --replacements :~q:foo:@~/xss-exploit @@ -216,4 +216,4 @@ hostname. It also means that we don't need to sniff additional data to generate certs in transparent mode. Upstream cert sniffing is on by default, and can optionally be turned off with -the `upstream_cert` option.
\ No newline at end of file +the `upstream_cert` option. diff --git a/docs/src/content/tools-mitmdump.md b/docs/src/content/tools-mitmdump.md index fb6a6c0c..dcc3bbf6 100644 --- a/docs/src/content/tools-mitmdump.md +++ b/docs/src/content/tools-mitmdump.md @@ -53,7 +53,7 @@ See the [client-side replay]({{< relref "overview-features#client-side-replay" ### Running a script {{< highlight bash >}} -mitmdump -s examples/add_header.py +mitmdump -s examples/simple/add_header.py {{< / highlight >}} This runs the **add_header.py** example script, which simply adds a new @@ -62,7 +62,7 @@ header to all responses. ### Scripted data transformation {{< highlight bash >}} -mitmdump -ns examples/add_header.py -r srcfile -w dstfile +mitmdump -ns examples/simple/add_header.py -r srcfile -w dstfile {{< / highlight >}} This command loads flows from **srcfile**, transforms it according to diff --git a/docs/src/content/tute-clientreplay.md b/docs/src/content/tute-clientreplay.md index 1bf69031..048fd0a5 100644 --- a/docs/src/content/tute-clientreplay.md +++ b/docs/src/content/tute-clientreplay.md @@ -31,9 +31,8 @@ mitmdump -w wireless-login ## 2. Point your browser at the mitmdump instance. -I use a tiny Firefox addon called [Toggle -Proxy](https://addons.mozilla.org/en-us/firefox/addon/toggle-proxy-51740/) to -switch quickly to and from mitmproxy. I'm assuming you've already [configured +There is a Firefox addon called [FoxyProxy](https://addons.mozilla.org/fi/firefox/addon/foxyproxy-standard/) that +lets you switch quickly to and from mitmproxy. I'm assuming you've already [configured your browser with mitmproxy's SSL certificate authority]({{< relref "concepts-certificates" >}}). @@ -43,7 +42,7 @@ And that's it\! You now have a serialised version of the login process in the file wireless-login, and you can replay it at any time like this: {{< highlight bash >}} -mitmdump -c wireless-login +mitmdump -C wireless-login {{< / highlight >}} ## Embellishments |