aboutsummaryrefslogtreecommitdiffstats
path: root/docs/src/content
diff options
context:
space:
mode:
Diffstat (limited to 'docs/src/content')
-rw-r--r--docs/src/content/concepts-certificates.md2
-rw-r--r--docs/src/content/concepts-filters.md5
-rw-r--r--docs/src/content/concepts-protocols.md4
-rw-r--r--docs/src/content/overview-features.md4
-rw-r--r--docs/src/content/tools-mitmdump.md4
-rw-r--r--docs/src/content/tute-clientreplay.md7
6 files changed, 16 insertions, 10 deletions
diff --git a/docs/src/content/concepts-certificates.md b/docs/src/content/concepts-certificates.md
index 4e2ae47a..4e9aa652 100644
--- a/docs/src/content/concepts-certificates.md
+++ b/docs/src/content/concepts-certificates.md
@@ -48,7 +48,7 @@ documentation for some common platforms. The mitmproxy CA cert is located in
- [Windows (automated)](https://technet.microsoft.com/en-us/library/cc732443.aspx)
{{< highlight bash >}}
-certutil.exe -importpfx Root mitmproxy-ca-cert.p12
+certutil -addstore root mitmproxy-ca-cert.cer
{{< / highlight >}}
- [Mac OS X](https://support.apple.com/kb/PH20129)
diff --git a/docs/src/content/concepts-filters.md b/docs/src/content/concepts-filters.md
index f0b9a4b2..b9c89456 100644
--- a/docs/src/content/concepts-filters.md
+++ b/docs/src/content/concepts-filters.md
@@ -49,3 +49,8 @@ Requests whose body contains the string "test":
Anything but requests with a text/html content type:
!(~q & ~t "text/html")
+
+Replace entire GET string in a request (quotes required to make it work):
+
+ ":~q ~m GET:.*:/replacement.html"
+
diff --git a/docs/src/content/concepts-protocols.md b/docs/src/content/concepts-protocols.md
index c79274bf..dc9d84fb 100644
--- a/docs/src/content/concepts-protocols.md
+++ b/docs/src/content/concepts-protocols.md
@@ -73,6 +73,8 @@ If an endpoint sends a PING to mitmproxy, a PONG will be sent back immediately
PING (without a payload) is sent to the other endpoint. Unsolicited PONG's are
not forwarded. All PING's and PONG's are logged (with payload if present).
+Please note that message interception, modification or replay are not possible yet.
+
## Raw TCP / TCP Proxy / Fallback
In case mitmproxy does not handle a specific protocol, you can exempt
@@ -83,7 +85,7 @@ but differs in two important aspects:
* The raw TCP messages are printed to the event log.
* SSL connections will be intercepted.
-Please note that message interception or modification are not possible yet. If
+Please note that message interception, modification or replay are not possible yet. If
you are not interested in the raw TCP messages, you should use the ignore
domains feature.
diff --git a/docs/src/content/overview-features.md b/docs/src/content/overview-features.md
index 9a4c5468..cf935adb 100644
--- a/docs/src/content/overview-features.md
+++ b/docs/src/content/overview-features.md
@@ -82,7 +82,7 @@ Replace `foo` with `bar` in requests:
:~q:foo:bar
{{< / highlight >}}
-Replace `foo` with with the data read from `~/xss-exploit`:
+Replace `foo` with the data read from `~/xss-exploit`:
{{< highlight bash >}}
mitmdump --replacements :~q:foo:@~/xss-exploit
@@ -216,4 +216,4 @@ hostname. It also means that we don't need to sniff additional data to generate
certs in transparent mode.
Upstream cert sniffing is on by default, and can optionally be turned off with
-the `upstream_cert` option. \ No newline at end of file
+the `upstream_cert` option.
diff --git a/docs/src/content/tools-mitmdump.md b/docs/src/content/tools-mitmdump.md
index fb6a6c0c..dcc3bbf6 100644
--- a/docs/src/content/tools-mitmdump.md
+++ b/docs/src/content/tools-mitmdump.md
@@ -53,7 +53,7 @@ See the [client-side replay]({{< relref "overview-features#client-side-replay"
### Running a script
{{< highlight bash >}}
-mitmdump -s examples/add_header.py
+mitmdump -s examples/simple/add_header.py
{{< / highlight >}}
This runs the **add_header.py** example script, which simply adds a new
@@ -62,7 +62,7 @@ header to all responses.
### Scripted data transformation
{{< highlight bash >}}
-mitmdump -ns examples/add_header.py -r srcfile -w dstfile
+mitmdump -ns examples/simple/add_header.py -r srcfile -w dstfile
{{< / highlight >}}
This command loads flows from **srcfile**, transforms it according to
diff --git a/docs/src/content/tute-clientreplay.md b/docs/src/content/tute-clientreplay.md
index 1bf69031..048fd0a5 100644
--- a/docs/src/content/tute-clientreplay.md
+++ b/docs/src/content/tute-clientreplay.md
@@ -31,9 +31,8 @@ mitmdump -w wireless-login
## 2. Point your browser at the mitmdump instance.
-I use a tiny Firefox addon called [Toggle
-Proxy](https://addons.mozilla.org/en-us/firefox/addon/toggle-proxy-51740/) to
-switch quickly to and from mitmproxy. I'm assuming you've already [configured
+There is a Firefox addon called [FoxyProxy](https://addons.mozilla.org/fi/firefox/addon/foxyproxy-standard/) that
+lets you switch quickly to and from mitmproxy. I'm assuming you've already [configured
your browser with mitmproxy's SSL certificate authority]({{< relref
"concepts-certificates" >}}).
@@ -43,7 +42,7 @@ And that's it\! You now have a serialised version of the login process
in the file wireless-login, and you can replay it at any time like this:
{{< highlight bash >}}
-mitmdump -c wireless-login
+mitmdump -C wireless-login
{{< / highlight >}}
## Embellishments