diff options
Diffstat (limited to 'docs')
-rwxr-xr-x | docs/build-archive | 3 | ||||
-rw-r--r-- | docs/src/content/concepts-certificates.md | 2 | ||||
-rw-r--r-- | docs/src/content/concepts-protocols.md | 4 | ||||
-rw-r--r-- | docs/src/content/overview-features.md | 4 | ||||
-rw-r--r-- | docs/src/content/tute-clientreplay.md | 5 |
5 files changed, 9 insertions, 9 deletions
diff --git a/docs/build-archive b/docs/build-archive index bd11d86e..004e625a 100755 --- a/docs/build-archive +++ b/docs/build-archive @@ -1,5 +1,4 @@ #!/bin/sh set -e -cd src -DOCS_ARCHIVE=true hugo +DOCS_ARCHIVE=true ./build-current diff --git a/docs/src/content/concepts-certificates.md b/docs/src/content/concepts-certificates.md index 4e2ae47a..4e9aa652 100644 --- a/docs/src/content/concepts-certificates.md +++ b/docs/src/content/concepts-certificates.md @@ -48,7 +48,7 @@ documentation for some common platforms. The mitmproxy CA cert is located in - [Windows (automated)](https://technet.microsoft.com/en-us/library/cc732443.aspx) {{< highlight bash >}} -certutil.exe -importpfx Root mitmproxy-ca-cert.p12 +certutil -addstore root mitmproxy-ca-cert.cer {{< / highlight >}} - [Mac OS X](https://support.apple.com/kb/PH20129) diff --git a/docs/src/content/concepts-protocols.md b/docs/src/content/concepts-protocols.md index c79274bf..dc9d84fb 100644 --- a/docs/src/content/concepts-protocols.md +++ b/docs/src/content/concepts-protocols.md @@ -73,6 +73,8 @@ If an endpoint sends a PING to mitmproxy, a PONG will be sent back immediately PING (without a payload) is sent to the other endpoint. Unsolicited PONG's are not forwarded. All PING's and PONG's are logged (with payload if present). +Please note that message interception, modification or replay are not possible yet. + ## Raw TCP / TCP Proxy / Fallback In case mitmproxy does not handle a specific protocol, you can exempt @@ -83,7 +85,7 @@ but differs in two important aspects: * The raw TCP messages are printed to the event log. * SSL connections will be intercepted. -Please note that message interception or modification are not possible yet. If +Please note that message interception, modification or replay are not possible yet. If you are not interested in the raw TCP messages, you should use the ignore domains feature. diff --git a/docs/src/content/overview-features.md b/docs/src/content/overview-features.md index 9a4c5468..cf935adb 100644 --- a/docs/src/content/overview-features.md +++ b/docs/src/content/overview-features.md @@ -82,7 +82,7 @@ Replace `foo` with `bar` in requests: :~q:foo:bar {{< / highlight >}} -Replace `foo` with with the data read from `~/xss-exploit`: +Replace `foo` with the data read from `~/xss-exploit`: {{< highlight bash >}} mitmdump --replacements :~q:foo:@~/xss-exploit @@ -216,4 +216,4 @@ hostname. It also means that we don't need to sniff additional data to generate certs in transparent mode. Upstream cert sniffing is on by default, and can optionally be turned off with -the `upstream_cert` option.
\ No newline at end of file +the `upstream_cert` option. diff --git a/docs/src/content/tute-clientreplay.md b/docs/src/content/tute-clientreplay.md index 1bf69031..275edfe6 100644 --- a/docs/src/content/tute-clientreplay.md +++ b/docs/src/content/tute-clientreplay.md @@ -31,9 +31,8 @@ mitmdump -w wireless-login ## 2. Point your browser at the mitmdump instance. -I use a tiny Firefox addon called [Toggle -Proxy](https://addons.mozilla.org/en-us/firefox/addon/toggle-proxy-51740/) to -switch quickly to and from mitmproxy. I'm assuming you've already [configured +There is a Firefox addon called [FoxyProxy](https://addons.mozilla.org/fi/firefox/addon/foxyproxy-standard/) that +lets you switch quickly to and from mitmproxy. I'm assuming you've already [configured your browser with mitmproxy's SSL certificate authority]({{< relref "concepts-certificates" >}}). |