Chapter 7 Configuring mitmproxy for secure connections

  1. To get mitmproxy working for secure sites, you need to make a fake SSL certificate for the site you want to sniff and this would work even when the certificate is invalid because of the reasons given in Priyank’s blog which you can go through
  2. So now follow the steps given below to create your fake certificate:

bash openssl genrsa -out myown.cert.key 8192 openssl req -new -x509 -key myown.cert.key -out fakesite.cert Specify all values like Company, BU, Country etc, as they appear in real certificate

bash cat myown.cert.key fakesite.cert > fakesite.pem 3. Now you can run mitmproxy using this command:

bash mitmproxy -p 8888 –cert=fakesite.pem Note: You can use any available port number in place of 8888 4. To connect to the network use the same port in advance options setting of the wifi network and then connect 5. Now you would be able to see request data from the secured site as well using mitmproxy

7.0.0.0.0.1 So this is how you can create a Raspberry Pi Sniffer. You can tweak the steps and do something really different on your own!