I have been using mitmproxy over Burp for day to day web app hacking these days. But we still use Burp scanner for lots of chores. I almost always chain through both to then go back in and use Burp features missing in mitmproxy (exploring site contents, etc.). But those are edge cases mostly needed for professional use and not for tinkering.
This tool recently helped me troubleshoot a bug I was facing and unable to solve due to the lack of Safari's development tools. Here's a link for anyone interested: http://eapen.in/mitmproxy-for-troubleshooting/
one of the best tools for reverse engineering mobile apps.
I'm just having problems when certificate pinning is enabled. Does anyone have an idea (or even a solution) how to deal with that?
Even without certificate pinning, starting with Android 7, you must decompile the app to allow user provided certificates. Or use an xposed module if you have a rooted device.
Also, if the app uses Google signin, you have to be rooted, because play services uses the package manager to check the app signer before giving the app a token.
Same here, mitmproxy was always the goto tool, but many apps now use certificate pinning, which stops it cold.
I was recently wishing for a "Jailbroken Mobile Testing Tool", similar to Sauce Labs or BrowserStack but with jailbroken mobiles -- i.e. a cloud-based service allowing you to remotely control a mobile phone through a web interface. Would that be interesting to have?
This service would allow you to load an app from the App Store / Google Play, and then interact with it while logging all network connections (in tcpdump/wireshark/HAR/etc. format). The controlled mobiles would be jailbroken and have tools like SSL kill switch (as mentioned by @bitexploder in another comment) installed by default.
(Going further: the same tool would allow you to download the phone's storage as a zip archive for further analysis)
It's been a while, but when I have been reversing android apps with certificate pinning in the past, I had the most luck with decompiling the apk with apktool, removing the certificate pinning in the samli bytecode, then recompiling and signing the apk again.
For iOS, I know there are jailbreak cydia tweaks that try to disable certificate pinning, but I have no experience with this.
This tool has really helped me on several occasions with a wide variety of issues up and down the stack. Even with debugging web apps because while the chrome Dev tools are awesome they (at least at the time as far as I know) didn't expose the initial headers/network exchange for certain types of auth like NTLM.
Mitmproxy is nice, but I think dev tools have become alot better, I discovered that because my standard work horse Chrome+Wireshark is very fincky with SSL:
The node proxy is really great in that it's fully extensible, allows you to generate certificates, and filter/save the kinds of traffic you get to simple JSON structures. We've found it to be a huge boon in development, but it's clearly inspired by mitmproxy (which predates node), so credit where it's due.
It's Java-based and forked out from some old MITM code from Selenium. It has a bunch of APIs for manipulating traffic, tweaking DNS resolution, rewriting content, etc. Just passing along in case anyone is looking for alternatives.
I was just looking for something like this. Googling led me to Charles proxy, which seems a pretty capable tool, and I'm growing fond of it though the Java UI is jarringly ugly.
Does anyone have any experience with charles vs mitmproxy?
I love mitmproxy, super easy to use (and to install an interception certificate) and the scripting support makes it very useful for pentesting iOS app traffic etc where I can't easily modify the client
[+] [-] bitexploder|8 years ago|reply
Also, mitmdump is one of the best and fastest ways to get ahold of web requests with Python to modify it on the fly.
http://docs.mitmproxy.org/en/stable/mitmdump.html
I have been using mitmproxy over Burp for day to day web app hacking these days. But we still use Burp scanner for lots of chores. I almost always chain through both to then go back in and use Burp features missing in mitmproxy (exploring site contents, etc.). But those are edge cases mostly needed for professional use and not for tinkering.
[+] [-] nopcode|8 years ago|reply
Would you mind sharing an example flow?
[+] [-] mrtksn|8 years ago|reply
[+] [-] hans_mueller|8 years ago|reply
[+] [-] eapen|8 years ago|reply
[+] [-] c7h|8 years ago|reply
[+] [-] Aissen|8 years ago|reply
See this mitmproxy bug: https://github.com/mitmproxy/mitmproxy/issues/2054
And this tool is nice to automate decompiling, adding the line in the manifest to be able to use user-installed certificates, and recompiling: https://github.com/levyitay/AddSecurityExceptionAndroid
Also, if the app uses Google signin, you have to be rooted, because play services uses the package manager to check the app signer before giving the app a token.
[+] [-] gregsadetsky|8 years ago|reply
I was recently wishing for a "Jailbroken Mobile Testing Tool", similar to Sauce Labs or BrowserStack but with jailbroken mobiles -- i.e. a cloud-based service allowing you to remotely control a mobile phone through a web interface. Would that be interesting to have?
This service would allow you to load an app from the App Store / Google Play, and then interact with it while logging all network connections (in tcpdump/wireshark/HAR/etc. format). The controlled mobiles would be jailbroken and have tools like SSL kill switch (as mentioned by @bitexploder in another comment) installed by default.
(Going further: the same tool would allow you to download the phone's storage as a zip archive for further analysis)
[+] [-] scandinavian|8 years ago|reply
For iOS, I know there are jailbreak cydia tweaks that try to disable certificate pinning, but I have no experience with this.
[+] [-] nnd|8 years ago|reply
[+] [-] drewbug|8 years ago|reply
[+] [-] s0l1dsnak3123|8 years ago|reply
[+] [-] pnutjam|8 years ago|reply
[+] [-] jenscow|8 years ago|reply
All I wanted to do was change a request header for one host.
After ~15 minutes I now have a transparent MITM https proxy - and I didn't even have to google the openssl command.
Edit: Also, the documentation is excellent as the software.
[+] [-] brazzledazzle|8 years ago|reply
[+] [-] emj|8 years ago|reply
Now days I use remote-debugging and Python a lot:
But the simplicity of a Mitmproxy is almost as great as wireshark.[+] [-] phsource|8 years ago|reply
We've shifted to using https://github.com/joeferner/node-http-mitm-proxy as a part of WrapAPI Proxy (https://wrapapi.com/proxy), which is a zero-install proxy in the style of mitmproxy and Charles.
The node proxy is really great in that it's fully extensible, allows you to generate certificates, and filter/save the kinds of traffic you get to simple JSON structures. We've found it to be a huge boon in development, but it's clearly inspired by mitmproxy (which predates node), so credit where it's due.
[+] [-] ijustdontcare|8 years ago|reply
[+] [-] Lightbody|8 years ago|reply
https://github.com/lightbody/browsermob-proxy
It's Java-based and forked out from some old MITM code from Selenium. It has a bunch of APIs for manipulating traffic, tweaking DNS resolution, rewriting content, etc. Just passing along in case anyone is looking for alternatives.
[+] [-] jwilk|8 years ago|reply
https://github.com/mitmproxy/mitmproxy/issues/1293
I learned this the hard way. If you run a proxy on an unfirewalled machine with public IPv4, it's going to be abused really fast. :-(
[+] [-] platz|8 years ago|reply
[+] [-] mhils|8 years ago|reply
[+] [-] pvg|8 years ago|reply
https://hn.algolia.com/?query=mitmproxy&sort=byPopularity&pr...
[+] [-] unknown|8 years ago|reply
[deleted]
[+] [-] beachy|8 years ago|reply
Does anyone have any experience with charles vs mitmproxy?
[+] [-] mpeg|8 years ago|reply
[+] [-] cowabungamann|8 years ago|reply
[+] [-] humanjvm|8 years ago|reply
[+] [-] diegorbaquero|8 years ago|reply
[+] [-] sheharyarn|8 years ago|reply
[+] [-] CameronBanga|8 years ago|reply