From 5acdd78b15ac85c6727f03e71d843d4b20e1a8d2 Mon Sep 17 00:00:00 2001 From: Maximilian Hils Date: Tue, 14 Feb 2017 17:45:54 +0100 Subject: fix typo --- examples/complex/dns_spoofing.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'examples/complex') diff --git a/examples/complex/dns_spoofing.py b/examples/complex/dns_spoofing.py index 1fb59f74..c6d46b66 100644 --- a/examples/complex/dns_spoofing.py +++ b/examples/complex/dns_spoofing.py @@ -1,5 +1,5 @@ """ -This inline scripts makes it possible to use mitmproxy in scenarios where IP spoofing has been used to redirect +This script makes it possible to use mitmproxy in scenarios where IP spoofing has been used to redirect connections to mitmproxy. The way this works is that we rely on either the TLS Server Name Indication (SNI) or the Host header of the HTTP request. Of course, this is not foolproof - if an HTTPS connection comes without SNI, we don't -- cgit v1.2.3