aboutsummaryrefslogtreecommitdiffstats
path: root/doc-src/certinstall/windows7.html
diff options
context:
space:
mode:
authorAldo Cortesi <aldo@nullcube.com>2011-03-16 15:27:26 +1300
committerAldo Cortesi <aldo@nullcube.com>2011-03-16 15:27:26 +1300
commit9af516b14b50fe11dce7c93516aef2cec7d5dadd (patch)
treede984156bec0b2a9429bba6a83c66a6e89edeaf7 /doc-src/certinstall/windows7.html
parente6ef0c3faf21971c144aaf93e6c05d98f1fe74be (diff)
downloadmitmproxy-9af516b14b50fe11dce7c93516aef2cec7d5dadd.tar.gz
mitmproxy-9af516b14b50fe11dce7c93516aef2cec7d5dadd.tar.bz2
mitmproxy-9af516b14b50fe11dce7c93516aef2cec7d5dadd.zip
Documentation.
Diffstat (limited to 'doc-src/certinstall/windows7.html')
-rw-r--r--doc-src/certinstall/windows7.html21
1 files changed, 21 insertions, 0 deletions
diff --git a/doc-src/certinstall/windows7.html b/doc-src/certinstall/windows7.html
index e69de29b..16d3f611 100644
--- a/doc-src/certinstall/windows7.html
+++ b/doc-src/certinstall/windows7.html
@@ -0,0 +1,21 @@
+
+<p> Here's a quick and easy procedure you can use for Windows 7, as long as
+the app in question uses the global Windows certificate repository. </p>
+
+<ul>
+
+ <li> Fire up MITMProxy, and configure Firefox on the Windows box to use
+ it. Browse to the target domain, and you should see a big warning about
+ an untrusted certificate. Use Firefox to export the certificate ("Add
+ Exception", "Get Certificate", then "View", tab to "Details" and click
+ "Export"). </li>
+
+ <li> From the command console, fire up <b>certmgr</b>. Select "Trusted
+ Root Certification Authorities", then on the top menu, "Action", "All
+ Tasks", and "Import". When prompted, select the certificate file you've
+ just saved from Firefox.</li>
+
+ <li> And that's it - your certificate should now be trusted for that
+ domain. Happy pentesting.</li>
+
+</ul>