Skip to content
Capture traffic, export TLS keys, upload to CloudShark
Branch: master
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Type Name Latest commit message Commit time
Failed to load latest commit information.


This is a collection of scripts to configure a Raspberry Pi as a wireless access point and install mitmproxy to act as an HTTP & HTTPS proxy. It can be configured as a transparent proxy and network traffic can be recorded using tcpdump and uploaded to CloudShark with the SSL/TLS master keys automatically applied for decryption.


This was tested using a Raspberry Pi 3 Model B running Raspbian Stretch Lite.


Installing mitmproxy v4 requires Python 3.6 (or higher) and pip3. This version is not available currently in the Raspbian repository so it will have to be installed manually.

In this git repository the script will download and compile version 3.7.2 of Python and install it to $HOME/.local. Then this script will add this version of Python to the users path and install mitmproxy using pip3. It will also download the packages necessary to build Python using apt.

Network Configuration

The will install the packages necessary to configure the device as a wireless access point and tcpdump to capture the network traffic. This script must be run as root using sudo:

sudo ./

After running this script the Raspberry Pi should be rebooted to finish the network configuration.

By default the Raspberry Pi will act as a wireless AP for the pi in the middle network and this is also the WPA pre-shared key. This can be configured in the /etc/hostapd.conf file. The wlan0 will be configured with a static IP address of and will serve IP addresses via DHCP from the range This can be modified in the file /etc/dnsmasq.conf

CloudShark API Token

An API token is required to upload captures and keylog files to CloudShark using the upload api method.

CloudShark users can view and create API tokens in the Preferences menu at the top of the page after logging in. This can be added as an environment variable by running:

echo "export CLOUDSHARK_API=<Replace with API Token>" >> ~/.bashrc

Now captures can be automatically be uploaded to CloudShark using the API after capturing the traffic.

Capturing and uploading

The starts by configuring the firewall to direct HTTP & HTTPS traffic to our mitmproxy acting as a transparent proxy.

Next it begins capturing HTTP and HTTPS traffic on the eth0 interface using tcpdump and starts mitmdump to act as our man-in-the-middle proxy. This will also dump the SSLKEYLOGFILE so that HTTPS traffic can be decrypted.

Clients connecting to the pi in the middle wireless traffic will now have all of their HTTP and HTTPS traffic being proxied though mitmproxy but may not trust its built-in certificate authority. There is a built in certificate installation app clients can use by brwosing to Here is more information on the mitmproxy certificate authority and how it can be configured.

Once the script is killed using Ctrl+c the proxy and network capture will be stopped and the capture file will be uploaded to CloudShark with a keylog file applied to decrypt the SSL/TLS traffic that was captures. Here is an example of a capture file that was taking using our Pi-in-the-Middle!

CS Enterprise

Customers with their own instance of CS Enterprise can update the cloudshark_url in the script to upload captures to their own private instance of CloudShark.

You can’t perform that action at this time.