Skip to content
This repository has been archived by the owner on Mar 27, 2021. It is now read-only.

A plugin for mitmproxy that communicates with the malidate server.

License

Notifications You must be signed in to change notification settings

redfast00/malidate-mitmproxy

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Malidate-mitmproxy

A plugin for mitmproxy that can execute some of the attacks described in Cracking the lens: Targeting HTTP's hidden attack surface. This plugin communicates with the malidate server, an opensource alternative to some parts of the Burpsuite Collaborator server.

Workflow

Start the proxyserver with

mitmdump --tcp '.*' -s "main.py --attack ReplaceHostAttack"

then configure your browser to use the proxyserver

chromium-browser --proxy-server="localhost:8080 --disable-http2"

and start browsing. When you are done, compare the server results with the client results using:

./compare.py

Setup

First, make a virtualenv and install the requirements.

virtualenv venv
pip3 install -r requirements.txt

Then configure the settings in configfiles/config.json and copy over configfiles/secret_config.example.json to configfiles/secret_config.json and edit those settings.

TODO

  • implement more attacks
  • implement a way to choose between attacks
  • improve compare script
  • refactor
  • make own custom launcher script

About

A plugin for mitmproxy that communicates with the malidate server.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages