(no title)
cientifico | 2 months ago
The closest free alternative is https://www.mitmproxy.org/ that is not even close.
And off course, https://www.wireshark.org/ but that is too generic and with a bigger learning curve.
Worth the money. And no subscription (or there weren't a subscription back then)
acheong08|2 months ago
Did post the source somewhere at some point but my git server got corrupted and I haven't gone and fixed it. https://github.com/acheong08/apple-corelocation-experiments/...
I wonder if AI is good enough to vibe code my horrible hacks into a full clone of Charles Proxy these days.
Annoying fact: Apple requires you to have a paid developer account to access the Packet Tunnel APIs. You can't even test it in XCode simulator because of how networking works in there. It's insane that I can't even develop for my own phone without paying an extra fee to Apple. The error message when you sideload without a paid account doesn't make it obvious at all and it took me a good day or two before realizing .
le-mark|2 months ago
A Linux phone can’t come fast enough. Yes there is at least one, on ancient hardware. IMO a viable Linux phone requires hardware at most one generation old.
aeonik|2 months ago
While vibe coding will get you something that potentially works, I've noticed LLMs are really bad at cleanly abstracting across multiple layers in this area. They usually will insist on parsing and serializing every field at every layer.
If you have the protocols/interfaces well defined up front it is very fast at building extensions, analytics or visualizations though.
jeroenhd|2 months ago
The packet tunnel story is crazy. I'm glad Android allows you to just use network APIs without question as a developer.
chrisweekly|2 months ago
_dark_matter_|2 months ago
ricardo81|2 months ago
efortis|2 months ago
https://portswigger.net/burp/communitydownload
OptionOfT|2 months ago
I then flip on WireGuard on my phone, pointed to mitmproxy, and seamlessly all traffic from my phone is decrypted and viewable through the website on my computer.
Except of-course all the applications these days that do certificate pinning, which is annoying, but for that we have Frida.
Fnoord|2 months ago
Burp Suite uses a subscription model. Charles a model like Sublime Text: you buy it and get to keep the version forever, major upgrades available for a discount.
I had to chuckle at this one:
> If you purchased a Charles license prior to 1 May 2008 your existing license key is still valid for Charles 5.
So I guess in past they used a model where you'd have lifetime upgrades.
Which also made me think: I recognize this name! This has to be an older piece of software. Was it published on Freshmeat in the start of this century?
There's also some TUI for Wireshark, such as frontends for tshark. I think [1] looks interesting, since it can be used with a local LLM (via Ollama).
[1] https://github.com/kspviswa/pktai
jeroenhd|2 months ago
29athrowaway|2 months ago
- Burp Proxy
- Wireshark, tshark
dns_snek|2 months ago
[1] without an elaborate setup, your program needs to be instructed to dump TLS encryption keys for Wireshark to read
rnewme|2 months ago
punnerud|2 months ago
Have mitmproxy gotten any better in usability over the years?
Just based on the images, is seems to have the same problems?
NicolaiS|2 months ago
The new-ish "Local Capture" and "WireGuard"-mode are quite nice.
And running e.g. `mitmproxy --ignore-hosts '.*' --show-ignored-hosts` [1] for monitoring apps with certificate pinning also a new feature
[1] cmd will turn mitmproxy into a "non-MITM proxy" but do show domains (SNI) the app is connecting to.
jeroenhd|2 months ago
leptons|2 months ago
https://www.telerik.com/fiddler
crossroadsguy|2 months ago